Skip to navigation

Security Advisory ethereal security update

Advisory: RHSA-2004:378-09
Type: Security Advisory
Severity: Moderate
Issued on: 2004-09-28
Last updated on: 2004-09-28
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2004-0633
CVE-2004-0634
CVE-2004-0635

Details

Updated Ethereal packages that fix various security vulnerabilities are now
available.

Ethereal is a program for monitoring network traffic.

The SNMP dissector in Ethereal releases 0.8.15 through 0.10.4 contained a
memory read flaw. On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash or
possibly execute arbitrary code. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-0635 to this issue.

The SMB dissector in Ethereal releases 0.9.15 through 0.10.4 contained a
null pointer flaw. On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0634 to this issue.

The iSNS dissector in Ethereal releases 0.10.3 through 0.10.4 contained an
integer overflow flaw. On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash or
possibly execute arbitrary code. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-0633 to this issue.

Users of Ethereal should upgrade to these updated packages, which contain
a version that is not vulnerable to these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
ethereal-0.10.5-0.30E.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5104f1cd2dea35fd3fdf79337a76783b
ethereal-0.10.5-0.30E.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5104f1cd2dea35fd3fdf79337a76783b
 
IA-32:
ethereal-0.10.5-0.30E.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 16e8b243835adf2d389847b83012476d
ethereal-gnome-0.10.5-0.30E.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: c994b6a92771d734260c850e530b638c
 
x86_64:
ethereal-0.10.5-0.30E.2.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 0167f986d80088b4118b563fe06a62b3
ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 98448ea99dc58ab55072961508c7305e
 
Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
ethereal-0.10.5-0.AS21.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 60215293034749ae22e909ed60eaee06
ethereal-0.10.5-0.AS21.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 60215293034749ae22e909ed60eaee06
 
IA-32:
ethereal-0.10.5-0.AS21.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 25857a9921162aa88bfc920e94fb20e5
ethereal-gnome-0.10.5-0.AS21.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 3c9f8e3c28a714cefd97b8ef350269e7
 
IA-64:
ethereal-0.10.5-0.AS21.2.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 67c86c33f2f5052b695fb5308eb9ef37
ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2b75b683911859104439b62c18465600
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
ethereal-0.10.5-0.30E.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5104f1cd2dea35fd3fdf79337a76783b
ethereal-0.10.5-0.30E.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5104f1cd2dea35fd3fdf79337a76783b
 
IA-32:
ethereal-0.10.5-0.30E.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 16e8b243835adf2d389847b83012476d
ethereal-gnome-0.10.5-0.30E.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: c994b6a92771d734260c850e530b638c
 
IA-64:
ethereal-0.10.5-0.30E.2.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: ec1027f7961c9109a7f29888805b6b4d
ethereal-gnome-0.10.5-0.30E.2.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2e66c5f80398fdda9ad4d1dbc44bcb29
 
PPC:
ethereal-0.10.5-0.30E.2.ppc.rpm
File outdated by:  RHSA-2006:0420
    MD5: 337260b85f120ac6c5c86e016c72f883
ethereal-gnome-0.10.5-0.30E.2.ppc.rpm
File outdated by:  RHSA-2006:0420
    MD5: c320f1e59876983c783ee89190dbfa34
 
s390:
ethereal-0.10.5-0.30E.2.s390.rpm
File outdated by:  RHSA-2006:0420
    MD5: de6dcfb5cc97d4f60b76a8c5f785b5cd
ethereal-gnome-0.10.5-0.30E.2.s390.rpm
File outdated by:  RHSA-2006:0420
    MD5: cb2b66afaeac23cea5570e3d63639e67
 
s390x:
ethereal-0.10.5-0.30E.2.s390x.rpm
File outdated by:  RHSA-2006:0420
    MD5: 3a58d3ce6c36a8ed26acaf7d87ae99a3
ethereal-gnome-0.10.5-0.30E.2.s390x.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5996b8a24b8a1fe531902caa66512a3f
 
x86_64:
ethereal-0.10.5-0.30E.2.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 0167f986d80088b4118b563fe06a62b3
ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 98448ea99dc58ab55072961508c7305e
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
ethereal-0.10.5-0.AS21.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 60215293034749ae22e909ed60eaee06
ethereal-0.10.5-0.AS21.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 60215293034749ae22e909ed60eaee06
 
IA-32:
ethereal-0.10.5-0.AS21.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 25857a9921162aa88bfc920e94fb20e5
ethereal-gnome-0.10.5-0.AS21.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 3c9f8e3c28a714cefd97b8ef350269e7
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
ethereal-0.10.5-0.30E.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5104f1cd2dea35fd3fdf79337a76783b
ethereal-0.10.5-0.30E.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5104f1cd2dea35fd3fdf79337a76783b
 
IA-32:
ethereal-0.10.5-0.30E.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 16e8b243835adf2d389847b83012476d
ethereal-gnome-0.10.5-0.30E.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: c994b6a92771d734260c850e530b638c
 
IA-64:
ethereal-0.10.5-0.30E.2.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: ec1027f7961c9109a7f29888805b6b4d
ethereal-gnome-0.10.5-0.30E.2.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2e66c5f80398fdda9ad4d1dbc44bcb29
 
x86_64:
ethereal-0.10.5-0.30E.2.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 0167f986d80088b4118b563fe06a62b3
ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 98448ea99dc58ab55072961508c7305e
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
ethereal-0.10.5-0.AS21.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 60215293034749ae22e909ed60eaee06
ethereal-0.10.5-0.AS21.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 60215293034749ae22e909ed60eaee06
 
IA-32:
ethereal-0.10.5-0.AS21.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 25857a9921162aa88bfc920e94fb20e5
ethereal-gnome-0.10.5-0.AS21.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 3c9f8e3c28a714cefd97b8ef350269e7
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
ethereal-0.10.5-0.30E.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5104f1cd2dea35fd3fdf79337a76783b
ethereal-0.10.5-0.30E.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5104f1cd2dea35fd3fdf79337a76783b
 
IA-32:
ethereal-0.10.5-0.30E.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 16e8b243835adf2d389847b83012476d
ethereal-gnome-0.10.5-0.30E.2.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: c994b6a92771d734260c850e530b638c
 
IA-64:
ethereal-0.10.5-0.30E.2.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: ec1027f7961c9109a7f29888805b6b4d
ethereal-gnome-0.10.5-0.30E.2.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2e66c5f80398fdda9ad4d1dbc44bcb29
 
x86_64:
ethereal-0.10.5-0.30E.2.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 0167f986d80088b4118b563fe06a62b3
ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 98448ea99dc58ab55072961508c7305e
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
ethereal-0.10.5-0.AS21.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 60215293034749ae22e909ed60eaee06
ethereal-0.10.5-0.AS21.2.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 60215293034749ae22e909ed60eaee06
 
IA-64:
ethereal-0.10.5-0.AS21.2.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 67c86c33f2f5052b695fb5308eb9ef37
ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2b75b683911859104439b62c18465600
 

Bugs fixed (see bugzilla for more information)

127381 - CAN-2004-0633/34/35 Multiple problems in Ethereal 0.10.4


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/