Skip to navigation

Security Advisory ethereal security update

Advisory: RHSA-2005:809-6
Type: Security Advisory
Severity: Moderate
Issued on: 2005-10-25
Last updated on: 2005-10-25
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2005-3184
CVE-2005-3241
CVE-2005-3242
CVE-2005-3243
CVE-2005-3244
CVE-2005-3245
CVE-2005-3246
CVE-2005-3247
CVE-2005-3248
CVE-2005-3249

Details

Updated Ethereal packages that fix various security vulnerabilities are now
available.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

The ethereal package is a program for monitoring network traffic.

A number of security flaws have been discovered in Ethereal. On a system
where Ethereal is running, a remote attacker could send malicious packets
to trigger these flaws and cause Ethereal to crash or potentially execute
arbitrary code. The Common Vulnerabilities and Exposures project
has assigned the names CVE-2005-3241, CVE-2005-3242, CVE-2005-3243,
CVE-2005-3244, CVE-2005-3245, CVE-2005-3246, CVE-2005-3247, CVE-2005-3248,
CVE-2005-3249, and CVE-2005-3184 to these issues.

Users of ethereal should upgrade to these updated packages, which contain
version 0.10.13 and are not vulnerable to these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
ethereal-0.10.13-1.EL3.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 840cbaeb806c2fe6a49c5dbbeb453420
 
IA-32:
ethereal-0.10.13-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 14420d7aaa42574171df62465c67286c
ethereal-gnome-0.10.13-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 3dd16373ef4d3cf72281c9680a848cd5
 
x86_64:
ethereal-0.10.13-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 0395ca339e6b13db2b16c0637b76d02d
ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 4930b1568ed5872e7d56d5d7ed6e2592
 
Red Hat Desktop (v. 4)

SRPMS:
ethereal-0.10.13-1.EL4.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: d681bea4204b9ef32169854674c69c36
 
IA-32:
ethereal-0.10.13-1.EL4.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 7bc624f155cf8417b870b7d800dce0af
ethereal-gnome-0.10.13-1.EL4.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2035674434fed87a8ab5b8457677fced
 
x86_64:
ethereal-0.10.13-1.EL4.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: d3713f0582dc378dbc5a2516681b2917
ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: edf1cb4236e4fc5808a353a6a7011059
 
Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
ethereal-0.10.13-1.AS21.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: eb36461db1cb0fe47e5fb258481e88aa
 
IA-32:
ethereal-0.10.13-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: b22ac1476294a1d178b7592e1ecd55a6
ethereal-gnome-0.10.13-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 278d4ba55468822045b82d0bfec8fb57
 
IA-64:
ethereal-0.10.13-1.AS21.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 7c5fd63ebf0b6da8b16eb68598183eb6
ethereal-gnome-0.10.13-1.AS21.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: c32209e9c951323d6b388a71f4f47156
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
ethereal-0.10.13-1.EL3.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 840cbaeb806c2fe6a49c5dbbeb453420
 
IA-32:
ethereal-0.10.13-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 14420d7aaa42574171df62465c67286c
ethereal-gnome-0.10.13-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 3dd16373ef4d3cf72281c9680a848cd5
 
IA-64:
ethereal-0.10.13-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: f38eec0b3ba412e079769050777ade45
ethereal-gnome-0.10.13-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5d7b1ffa4769991c36f5f4688c445bc0
 
PPC:
ethereal-0.10.13-1.EL3.1.ppc.rpm
File outdated by:  RHSA-2006:0420
    MD5: 240a96840557cee9722b0ba62e8e2923
ethereal-gnome-0.10.13-1.EL3.1.ppc.rpm
File outdated by:  RHSA-2006:0420
    MD5: 519431832aa534e2612c57819bdb10a6
 
s390:
ethereal-0.10.13-1.EL3.1.s390.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2a43ed4d130a7cd719e16074a1e4270f
ethereal-gnome-0.10.13-1.EL3.1.s390.rpm
File outdated by:  RHSA-2006:0420
    MD5: 8cb30d301f89527fda2cea9598fe1017
 
s390x:
ethereal-0.10.13-1.EL3.1.s390x.rpm
File outdated by:  RHSA-2006:0420
    MD5: 1addb41c4e2cddb968439caa5073eaa8
ethereal-gnome-0.10.13-1.EL3.1.s390x.rpm
File outdated by:  RHSA-2006:0420
    MD5: 777703bf9ddf1f83f6b4b657e4efb5e5
 
x86_64:
ethereal-0.10.13-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 0395ca339e6b13db2b16c0637b76d02d
ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 4930b1568ed5872e7d56d5d7ed6e2592
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
ethereal-0.10.13-1.EL4.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: d681bea4204b9ef32169854674c69c36
 
IA-32:
ethereal-0.10.13-1.EL4.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 7bc624f155cf8417b870b7d800dce0af
ethereal-gnome-0.10.13-1.EL4.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2035674434fed87a8ab5b8457677fced
 
IA-64:
ethereal-0.10.13-1.EL4.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: e47695fc53ab136bfc7f212110773ebf
ethereal-gnome-0.10.13-1.EL4.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: ee069d182cc115a68cf096e6c344f5b1
 
PPC:
ethereal-0.10.13-1.EL4.1.ppc.rpm
File outdated by:  RHSA-2006:0420
    MD5: edc15234bd865d7f1ae2c1fe9dc585fb
ethereal-gnome-0.10.13-1.EL4.1.ppc.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5f62ac7773c040add70aa59f9ccce4c0
 
s390:
ethereal-0.10.13-1.EL4.1.s390.rpm
File outdated by:  RHSA-2006:0420
    MD5: cbb1c8aa37f993da5d6792ecc4ebd6d5
ethereal-gnome-0.10.13-1.EL4.1.s390.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2433e467c4d57b62b33c886e36885c56
 
s390x:
ethereal-0.10.13-1.EL4.1.s390x.rpm
File outdated by:  RHSA-2006:0420
    MD5: 92889684953c0ed159ab7bcd5e0f4e4d
ethereal-gnome-0.10.13-1.EL4.1.s390x.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2eccee9b13a1b25523cb6754b6c895a2
 
x86_64:
ethereal-0.10.13-1.EL4.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: d3713f0582dc378dbc5a2516681b2917
ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: edf1cb4236e4fc5808a353a6a7011059
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
ethereal-0.10.13-1.AS21.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: eb36461db1cb0fe47e5fb258481e88aa
 
IA-32:
ethereal-0.10.13-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: b22ac1476294a1d178b7592e1ecd55a6
ethereal-gnome-0.10.13-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 278d4ba55468822045b82d0bfec8fb57
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
ethereal-0.10.13-1.EL3.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 840cbaeb806c2fe6a49c5dbbeb453420
 
IA-32:
ethereal-0.10.13-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 14420d7aaa42574171df62465c67286c
ethereal-gnome-0.10.13-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 3dd16373ef4d3cf72281c9680a848cd5
 
IA-64:
ethereal-0.10.13-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: f38eec0b3ba412e079769050777ade45
ethereal-gnome-0.10.13-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5d7b1ffa4769991c36f5f4688c445bc0
 
x86_64:
ethereal-0.10.13-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 0395ca339e6b13db2b16c0637b76d02d
ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 4930b1568ed5872e7d56d5d7ed6e2592
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
ethereal-0.10.13-1.EL4.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: d681bea4204b9ef32169854674c69c36
 
IA-32:
ethereal-0.10.13-1.EL4.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 7bc624f155cf8417b870b7d800dce0af
ethereal-gnome-0.10.13-1.EL4.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2035674434fed87a8ab5b8457677fced
 
IA-64:
ethereal-0.10.13-1.EL4.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: e47695fc53ab136bfc7f212110773ebf
ethereal-gnome-0.10.13-1.EL4.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: ee069d182cc115a68cf096e6c344f5b1
 
x86_64:
ethereal-0.10.13-1.EL4.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: d3713f0582dc378dbc5a2516681b2917
ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: edf1cb4236e4fc5808a353a6a7011059
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
ethereal-0.10.13-1.AS21.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: eb36461db1cb0fe47e5fb258481e88aa
 
IA-32:
ethereal-0.10.13-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: b22ac1476294a1d178b7592e1ecd55a6
ethereal-gnome-0.10.13-1.AS21.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 278d4ba55468822045b82d0bfec8fb57
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
ethereal-0.10.13-1.EL3.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: 840cbaeb806c2fe6a49c5dbbeb453420
 
IA-32:
ethereal-0.10.13-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 14420d7aaa42574171df62465c67286c
ethereal-gnome-0.10.13-1.EL3.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 3dd16373ef4d3cf72281c9680a848cd5
 
IA-64:
ethereal-0.10.13-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: f38eec0b3ba412e079769050777ade45
ethereal-gnome-0.10.13-1.EL3.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 5d7b1ffa4769991c36f5f4688c445bc0
 
x86_64:
ethereal-0.10.13-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 0395ca339e6b13db2b16c0637b76d02d
ethereal-gnome-0.10.13-1.EL3.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 4930b1568ed5872e7d56d5d7ed6e2592
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
ethereal-0.10.13-1.EL4.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: d681bea4204b9ef32169854674c69c36
 
IA-32:
ethereal-0.10.13-1.EL4.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 7bc624f155cf8417b870b7d800dce0af
ethereal-gnome-0.10.13-1.EL4.1.i386.rpm
File outdated by:  RHSA-2006:0420
    MD5: 2035674434fed87a8ab5b8457677fced
 
IA-64:
ethereal-0.10.13-1.EL4.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: e47695fc53ab136bfc7f212110773ebf
ethereal-gnome-0.10.13-1.EL4.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: ee069d182cc115a68cf096e6c344f5b1
 
x86_64:
ethereal-0.10.13-1.EL4.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: d3713f0582dc378dbc5a2516681b2917
ethereal-gnome-0.10.13-1.EL4.1.x86_64.rpm
File outdated by:  RHSA-2006:0420
    MD5: edf1cb4236e4fc5808a353a6a7011059
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
ethereal-0.10.13-1.AS21.1.src.rpm
File outdated by:  RHSA-2006:0420
    MD5: eb36461db1cb0fe47e5fb258481e88aa
 
IA-64:
ethereal-0.10.13-1.AS21.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: 7c5fd63ebf0b6da8b16eb68598183eb6
ethereal-gnome-0.10.13-1.AS21.1.ia64.rpm
File outdated by:  RHSA-2006:0420
    MD5: c32209e9c951323d6b388a71f4f47156
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

171062 - CVE-2005-3241 Multiple ethereal issues (CVE-2005-3242 CVE-2005-3243 CVE-2005-3244 CVE-2005-3245 CVE-2005-3246 CVE-2005-3247 CVE-2005-3248 CVE-2005-3249 CVE-2005-3184)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/