Skip to navigation

Security Advisory ethereal security update

Advisory: RHSA-2005:011-11
Type: Security Advisory
Severity: Moderate
Issued on: 2005-02-02
Last updated on: 2005-02-02
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2004-1139
CVE-2004-1140
CVE-2004-1141
CVE-2004-1142
CVE-2005-0006
CVE-2005-0007
CVE-2005-0008
CVE-2005-0009
CVE-2005-0010
CVE-2005-0084

Details

Updated Ethereal packages that fix various security vulnerabilities are now
available.

Ethereal is a program for monitoring network traffic.

A number of security flaws have been discovered in Ethereal. On a system
where Ethereal is running, a remote attacker could send malicious packets
to trigger these flaws.

A flaw in the DICOM dissector could cause a crash. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-1139 to this issue.

A invalid RTP timestamp could hang Ethereal and create a large temporary
file, possibly filling available disk space. (CAN-2004-1140)

The HTTP dissector could access previously-freed memory, causing a crash.
(CAN-2004-1141)

An improperly formatted SMB packet could make Ethereal hang, maximizing CPU
utilization. (CAN-2004-1142)

The COPS dissector could go into an infinite loop. (CAN-2005-0006)

The DLSw dissector could cause an assertion, making Ethereal exit
prematurely. (CAN-2005-0007)

The DNP dissector could cause memory corruption. (CAN-2005-0008)

The Gnutella dissector could cause an assertion, making Ethereal exit
prematurely. (CAN-2005-0009)

The MMSE dissector could free static memory, causing a crash. (CAN-2005-0010)

The X11 protocol dissector is vulnerable to a string buffer overflow.
(CAN-2005-0084)

Users of Ethereal should upgrade to these updated packages which contain
version 0.10.9 that is not vulnerable to these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 3)

IA-32:
ethereal-0.10.9-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 9d49bf8347c7959c5e25193017ace76d
ethereal-gnome-0.10.9-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2c2783bacc7346d4e6c2e5e4ca03be7b
 
x86_64:
ethereal-0.10.9-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 6cd423bc315ba6512d502a42ea0704d4
ethereal-gnome-0.10.9-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 85a1ef6aa68b81f2eee6508b6fcf332c
 
Red Hat Enterprise Linux AS (v. 2.1)

IA-32:
ethereal-0.10.9-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 77bd956f37f71564833412f6524a0e1c
ethereal-gnome-0.10.9-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 7a8a36ad8bcc2ba31c00090416f06e3c
 
IA-64:
ethereal-0.10.9-1.AS21.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 849dc6fe5edd7ca3d1bc38c72270253c
ethereal-gnome-0.10.9-1.AS21.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 52bf0df7688828650a9a89d1e1d55910
 
Red Hat Enterprise Linux AS (v. 3)

IA-32:
ethereal-0.10.9-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 9d49bf8347c7959c5e25193017ace76d
ethereal-gnome-0.10.9-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2c2783bacc7346d4e6c2e5e4ca03be7b
 
IA-64:
ethereal-0.10.9-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 4fc0567ea34cf3a2739eae5164716447
ethereal-gnome-0.10.9-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: c2561995bed9ceae011ed0919ad20a1a
 
PPC:
ethereal-0.10.9-1.EL3.1.ppc.rpm
File outdated by:  RHSA-2006:0420
    MD5: b31e416c3e60700b89dcf159ad17ae12
ethereal-gnome-0.10.9-1.EL3.1.ppc.rpm
File outdated by:  RHSA-2006:0420
    MD5: b107c7af04873dc6f1ad36fb7997be06
 
s390:
ethereal-0.10.9-1.EL3.1.s390.rpm
File outdated by:  RHSA-2006:0420
    MD5: 091392ff4fd5c7622be8d400472d81a3
ethereal-gnome-0.10.9-1.EL3.1.s390.rpm
File outdated by:  RHSA-2006:0420
    MD5: 4ea3d5ca3dc80d44c148e6d0c1fa5e5d
 
s390x:
ethereal-0.10.9-1.EL3.1.s390x.rpm
File outdated by:  RHSA-2006:0420
    MD5: a3be8c593e45081a19ed649de55345d7
ethereal-gnome-0.10.9-1.EL3.1.s390x.rpm
File outdated by:  RHSA-2006:0420
    MD5: 60009d9e0687857a0d20503d4637ca0f
 
x86_64:
ethereal-0.10.9-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 6cd423bc315ba6512d502a42ea0704d4
ethereal-gnome-0.10.9-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 85a1ef6aa68b81f2eee6508b6fcf332c
 
Red Hat Enterprise Linux ES (v. 2.1)

IA-32:
ethereal-0.10.9-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 77bd956f37f71564833412f6524a0e1c
ethereal-gnome-0.10.9-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 7a8a36ad8bcc2ba31c00090416f06e3c
 
Red Hat Enterprise Linux ES (v. 3)

IA-32:
ethereal-0.10.9-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 9d49bf8347c7959c5e25193017ace76d
ethereal-gnome-0.10.9-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2c2783bacc7346d4e6c2e5e4ca03be7b
 
IA-64:
ethereal-0.10.9-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 4fc0567ea34cf3a2739eae5164716447
ethereal-gnome-0.10.9-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: c2561995bed9ceae011ed0919ad20a1a
 
x86_64:
ethereal-0.10.9-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 6cd423bc315ba6512d502a42ea0704d4
ethereal-gnome-0.10.9-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 85a1ef6aa68b81f2eee6508b6fcf332c
 
Red Hat Enterprise Linux WS (v. 2.1)

IA-32:
ethereal-0.10.9-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 77bd956f37f71564833412f6524a0e1c
ethereal-gnome-0.10.9-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 7a8a36ad8bcc2ba31c00090416f06e3c
 
Red Hat Enterprise Linux WS (v. 3)

IA-32:
ethereal-0.10.9-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 9d49bf8347c7959c5e25193017ace76d
ethereal-gnome-0.10.9-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2c2783bacc7346d4e6c2e5e4ca03be7b
 
IA-64:
ethereal-0.10.9-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 4fc0567ea34cf3a2739eae5164716447
ethereal-gnome-0.10.9-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: c2561995bed9ceae011ed0919ad20a1a
 
x86_64:
ethereal-0.10.9-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 6cd423bc315ba6512d502a42ea0704d4
ethereal-gnome-0.10.9-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 85a1ef6aa68b81f2eee6508b6fcf332c
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

IA-64:
ethereal-0.10.9-1.AS21.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 849dc6fe5edd7ca3d1bc38c72270253c
ethereal-gnome-0.10.9-1.AS21.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 52bf0df7688828650a9a89d1e1d55910
 

Bugs fixed (see bugzilla for more information)

142952 - CAN-2004-1139 Ethereal flaws (CAN-2004-1140 CAN-2004-1141 CAN-2004-1142)
145481 - CAN-2005-0006 multiple ethereal issues (CAN-2005-0007 CAN-2005-0008 CAN-2005-0009 CAN-2005-0010 CAN-2005-0084)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/