Updated Ethereal packages has been released for Red Hat Enterprise Linux
---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated Ethereal packages fix security issues
Advisory ID: RHSA-2004:378-01
Issue date: 2004-08-05
Updated on: 2004-08-05
Product: Red Hat Enterprise Linux
Obsoletes: RHSA-2004:234
CVE Names: CAN-2004-0633 CAN-2004-0634 CAN-2004-0635
----------------------------------------------------------------------
1. Summary:
Updated Ethereal packages that fix various security vulnerabilities are now available.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Problem description:
Ethereal is a program for monitoring network traffic.
The SNMP dissector in Ethereal releases 0.8.15 through 0.10.4 contained a memory read flaw. On a system where Ethereal is running, a remote attacker could send malicious packets that could cause Ethereal to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0635 to this issue.
The SMB dissector in Ethereal releases 0.9.15 through 0.10.4 contained a null pointer flaw. On a system where Ethereal is running, a remote attacker could send malicious packets that could cause Ethereal to crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0634 to this issue.
The iSNS dissector in Ethereal releases 0.10.3 through 0.10.4 contained an integer overflow flaw. On a system where Ethereal is running, a remote attacker could send malicious packets that could cause Ethereal to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0633 to this issue.
Users of Ethereal should upgrade to these updated packages, which contain a version that is not vulnerable to these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
127381 - CAN-2004-0633/34/35 Multiple problems in Ethereal 0.10.4
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm
i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm
ia64:
67c86c33f2f5052b695fb5308eb9ef37 ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600 ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm
ia64:
67c86c33f2f5052b695fb5308eb9ef37 ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600 ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm
i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm
i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm
i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm
ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm
ppc:
337260b85f120ac6c5c86e016c72f883 ethereal-0.10.5-0.30E.2.ppc.rpm
c320f1e59876983c783ee89190dbfa34 ethereal-gnome-0.10.5-0.30E.2.ppc.rpm
s390:
de6dcfb5cc97d4f60b76a8c5f785b5cd ethereal-0.10.5-0.30E.2.s390.rpm
cb2b66afaeac23cea5570e3d63639e67 ethereal-gnome-0.10.5-0.30E.2.s390.rpm
s390x:
3a58d3ce6c36a8ed26acaf7d87ae99a3 ethereal-0.10.5-0.30E.2.s390x.rpm
5996b8a24b8a1fe531902caa66512a3f ethereal-gnome-0.10.5-0.30E.2.s390x.rpm
x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm
i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm
ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm
x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm
i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm
ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm
x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package
7. References:
http://www.ethereal.com/appnotes/enpa-sa-00015.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0633
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0635
8. Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html
Copyright 2004 Red Hat, Inc.
---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated Ethereal packages fix security issues
Advisory ID: RHSA-2004:378-01
Issue date: 2004-08-05
Updated on: 2004-08-05
Product: Red Hat Enterprise Linux
Obsoletes: RHSA-2004:234
CVE Names: CAN-2004-0633 CAN-2004-0634 CAN-2004-0635
----------------------------------------------------------------------
1. Summary:
Updated Ethereal packages that fix various security vulnerabilities are now available.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Problem description:
Ethereal is a program for monitoring network traffic.
The SNMP dissector in Ethereal releases 0.8.15 through 0.10.4 contained a memory read flaw. On a system where Ethereal is running, a remote attacker could send malicious packets that could cause Ethereal to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0635 to this issue.
The SMB dissector in Ethereal releases 0.9.15 through 0.10.4 contained a null pointer flaw. On a system where Ethereal is running, a remote attacker could send malicious packets that could cause Ethereal to crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0634 to this issue.
The iSNS dissector in Ethereal releases 0.10.3 through 0.10.4 contained an integer overflow flaw. On a system where Ethereal is running, a remote attacker could send malicious packets that could cause Ethereal to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0633 to this issue.
Users of Ethereal should upgrade to these updated packages, which contain a version that is not vulnerable to these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
127381 - CAN-2004-0633/34/35 Multiple problems in Ethereal 0.10.4
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm
i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm
ia64:
67c86c33f2f5052b695fb5308eb9ef37 ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600 ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm
ia64:
67c86c33f2f5052b695fb5308eb9ef37 ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600 ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm
i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm
i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm
i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm
ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm
ppc:
337260b85f120ac6c5c86e016c72f883 ethereal-0.10.5-0.30E.2.ppc.rpm
c320f1e59876983c783ee89190dbfa34 ethereal-gnome-0.10.5-0.30E.2.ppc.rpm
s390:
de6dcfb5cc97d4f60b76a8c5f785b5cd ethereal-0.10.5-0.30E.2.s390.rpm
cb2b66afaeac23cea5570e3d63639e67 ethereal-gnome-0.10.5-0.30E.2.s390.rpm
s390x:
3a58d3ce6c36a8ed26acaf7d87ae99a3 ethereal-0.10.5-0.30E.2.s390x.rpm
5996b8a24b8a1fe531902caa66512a3f ethereal-gnome-0.10.5-0.30E.2.s390x.rpm
x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm
i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm
ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm
x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm
i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm
ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm
x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package
7. References:
http://www.ethereal.com/appnotes/enpa-sa-00015.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0633
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0635
8. Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html
Copyright 2004 Red Hat, Inc.