Skip to navigation

Security Advisory ethereal security update

Advisory: RHSA-2006:0420-8
Type: Security Advisory
Severity: Moderate
Issued on: 2006-05-03
Last updated on: 2006-05-03
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2006-1932
CVE-2006-1933
CVE-2006-1934
CVE-2006-1935
CVE-2006-1936
CVE-2006-1937
CVE-2006-1938
CVE-2006-1939
CVE-2006-1940

Details

Updated Ethereal packages that fix various security vulnerabilities are now
available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Ethereal is a program for monitoring network traffic.

Several denial of service bugs were found in Ethereal's protocol
dissectors. Ethereal could crash or stop responding if it reads a malformed
packet off the network. (CVE-2006-1932, CVE-2006-1933, CVE-2006-1937,
CVE-2006-1938, CVE-2006-1939, CVE-2006-1940)

Several buffer overflow bugs were found in Ethereal's COPS, telnet, and
ALCAP dissectors as well as Network Instruments file code and
NetXray/Windows Sniffer file code. Ethereal could crash or execute
arbitrary code if it reads a malformed packet off the network.
(CVE-2006-1934, CVE-2006-1935, CVE-2006-1936)

Users of ethereal should upgrade to these updated packages containing
version 0.99.0, which is not vulnerable to these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
ethereal-0.99.0-EL3.2.src.rpm     MD5: e906f4a6af6daa5097657281addd8ae6
 
IA-32:
ethereal-0.99.0-EL3.2.i386.rpm     MD5: 5eb5b51532d13f0c7116154ee2a41830
ethereal-gnome-0.99.0-EL3.2.i386.rpm     MD5: dec7d4558104ee04721b12b52371edb2
 
x86_64:
ethereal-0.99.0-EL3.2.x86_64.rpm     MD5: 309c8d38e5d4e93f249334042280cea4
ethereal-gnome-0.99.0-EL3.2.x86_64.rpm     MD5: 8449be413e04b25fd845f24e22296e32
 
Red Hat Desktop (v. 4)

SRPMS:
ethereal-0.99.0-EL4.2.src.rpm     MD5: 11c84a1dffe6e776982f1894ec5cf408
 
IA-32:
ethereal-0.99.0-EL4.2.i386.rpm     MD5: 0e681119d0612fde2ba2eba5c37d48a5
ethereal-gnome-0.99.0-EL4.2.i386.rpm     MD5: edfe88be11e00c7bab18e67d8532eccb
 
x86_64:
ethereal-0.99.0-EL4.2.x86_64.rpm     MD5: 5ebe9b3c26db1f789d9ca53a11be3fdb
ethereal-gnome-0.99.0-EL4.2.x86_64.rpm     MD5: f881c98450c85c7d7cf29cf5f2c38bf9
 
Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
ethereal-0.99.0-AS21.2.src.rpm     MD5: b5455c25efc4a410310c0c085c00b706
 
IA-32:
ethereal-0.99.0-AS21.2.i386.rpm     MD5: 4567c68e42a3e12b1db52450c4ef774f
ethereal-gnome-0.99.0-AS21.2.i386.rpm     MD5: 960c7259c6f670a2e0b1313a62e66230
 
IA-64:
ethereal-0.99.0-AS21.2.ia64.rpm     MD5: 2c7cf48fd665437ca174ab1691c3e001
ethereal-gnome-0.99.0-AS21.2.ia64.rpm     MD5: 8d9ece756ff3abe8fc079addaabf8026
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
ethereal-0.99.0-EL3.2.src.rpm     MD5: e906f4a6af6daa5097657281addd8ae6
 
IA-32:
ethereal-0.99.0-EL3.2.i386.rpm     MD5: 5eb5b51532d13f0c7116154ee2a41830
ethereal-gnome-0.99.0-EL3.2.i386.rpm     MD5: dec7d4558104ee04721b12b52371edb2
 
IA-64:
ethereal-0.99.0-EL3.2.ia64.rpm     MD5: 5153ded0c31c46c5cf40cad68f639e26
ethereal-gnome-0.99.0-EL3.2.ia64.rpm     MD5: 0cea4366de8984b618983029774c0d5d
 
PPC:
ethereal-0.99.0-EL3.2.ppc.rpm     MD5: c9ff55fa2e166a05c5c7f3428bb5e891
ethereal-gnome-0.99.0-EL3.2.ppc.rpm     MD5: ebd68ade788dab1fb3d27c81f7580d14
 
s390:
ethereal-0.99.0-EL3.2.s390.rpm     MD5: a08608a5c614f563f50b550d57a957db
ethereal-gnome-0.99.0-EL3.2.s390.rpm     MD5: a377e876c9cf40432a0a1187c426554e
 
s390x:
ethereal-0.99.0-EL3.2.s390x.rpm     MD5: e9b06433b7f4d008c73ee81538d6d25f
ethereal-gnome-0.99.0-EL3.2.s390x.rpm     MD5: 88aa3cffd429159bdc626b70d035d538
 
x86_64:
ethereal-0.99.0-EL3.2.x86_64.rpm     MD5: 309c8d38e5d4e93f249334042280cea4
ethereal-gnome-0.99.0-EL3.2.x86_64.rpm     MD5: 8449be413e04b25fd845f24e22296e32
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
ethereal-0.99.0-EL4.2.src.rpm     MD5: 11c84a1dffe6e776982f1894ec5cf408
 
IA-32:
ethereal-0.99.0-EL4.2.i386.rpm     MD5: 0e681119d0612fde2ba2eba5c37d48a5
ethereal-gnome-0.99.0-EL4.2.i386.rpm     MD5: edfe88be11e00c7bab18e67d8532eccb
 
IA-64:
ethereal-0.99.0-EL4.2.ia64.rpm     MD5: 728dc11278e78320d26696c253168d4b
ethereal-gnome-0.99.0-EL4.2.ia64.rpm     MD5: 8059bb8d6f03b25f01293cf60804c57e
 
PPC:
ethereal-0.99.0-EL4.2.ppc.rpm     MD5: 39c0e6dfa0ccaef541145abcd22450e6
ethereal-gnome-0.99.0-EL4.2.ppc.rpm     MD5: 205a0abde7810f83121dad614bf552ae
 
s390:
ethereal-0.99.0-EL4.2.s390.rpm     MD5: a42541a4898353df730628e4ca12574b
ethereal-gnome-0.99.0-EL4.2.s390.rpm     MD5: 56a5a8f29f450100af22588c098b9e4f
 
s390x:
ethereal-0.99.0-EL4.2.s390x.rpm     MD5: 005c36983735d8ea5efebd53f40819e8
ethereal-gnome-0.99.0-EL4.2.s390x.rpm     MD5: dcb5432d4b10df325781a5d7285fa9b4
 
x86_64:
ethereal-0.99.0-EL4.2.x86_64.rpm     MD5: 5ebe9b3c26db1f789d9ca53a11be3fdb
ethereal-gnome-0.99.0-EL4.2.x86_64.rpm     MD5: f881c98450c85c7d7cf29cf5f2c38bf9
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
ethereal-0.99.0-AS21.2.src.rpm     MD5: b5455c25efc4a410310c0c085c00b706
 
IA-32:
ethereal-0.99.0-AS21.2.i386.rpm     MD5: 4567c68e42a3e12b1db52450c4ef774f
ethereal-gnome-0.99.0-AS21.2.i386.rpm     MD5: 960c7259c6f670a2e0b1313a62e66230
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
ethereal-0.99.0-EL3.2.src.rpm     MD5: e906f4a6af6daa5097657281addd8ae6
 
IA-32:
ethereal-0.99.0-EL3.2.i386.rpm     MD5: 5eb5b51532d13f0c7116154ee2a41830
ethereal-gnome-0.99.0-EL3.2.i386.rpm     MD5: dec7d4558104ee04721b12b52371edb2
 
IA-64:
ethereal-0.99.0-EL3.2.ia64.rpm     MD5: 5153ded0c31c46c5cf40cad68f639e26
ethereal-gnome-0.99.0-EL3.2.ia64.rpm     MD5: 0cea4366de8984b618983029774c0d5d
 
x86_64:
ethereal-0.99.0-EL3.2.x86_64.rpm     MD5: 309c8d38e5d4e93f249334042280cea4
ethereal-gnome-0.99.0-EL3.2.x86_64.rpm     MD5: 8449be413e04b25fd845f24e22296e32
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
ethereal-0.99.0-EL4.2.src.rpm     MD5: 11c84a1dffe6e776982f1894ec5cf408
 
IA-32:
ethereal-0.99.0-EL4.2.i386.rpm     MD5: 0e681119d0612fde2ba2eba5c37d48a5
ethereal-gnome-0.99.0-EL4.2.i386.rpm     MD5: edfe88be11e00c7bab18e67d8532eccb
 
IA-64:
ethereal-0.99.0-EL4.2.ia64.rpm     MD5: 728dc11278e78320d26696c253168d4b
ethereal-gnome-0.99.0-EL4.2.ia64.rpm     MD5: 8059bb8d6f03b25f01293cf60804c57e
 
x86_64:
ethereal-0.99.0-EL4.2.x86_64.rpm     MD5: 5ebe9b3c26db1f789d9ca53a11be3fdb
ethereal-gnome-0.99.0-EL4.2.x86_64.rpm     MD5: f881c98450c85c7d7cf29cf5f2c38bf9
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
ethereal-0.99.0-AS21.2.src.rpm     MD5: b5455c25efc4a410310c0c085c00b706
 
IA-32:
ethereal-0.99.0-AS21.2.i386.rpm     MD5: 4567c68e42a3e12b1db52450c4ef774f
ethereal-gnome-0.99.0-AS21.2.i386.rpm     MD5: 960c7259c6f670a2e0b1313a62e66230
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
ethereal-0.99.0-EL3.2.src.rpm     MD5: e906f4a6af6daa5097657281addd8ae6
 
IA-32:
ethereal-0.99.0-EL3.2.i386.rpm     MD5: 5eb5b51532d13f0c7116154ee2a41830
ethereal-gnome-0.99.0-EL3.2.i386.rpm     MD5: dec7d4558104ee04721b12b52371edb2
 
IA-64:
ethereal-0.99.0-EL3.2.ia64.rpm     MD5: 5153ded0c31c46c5cf40cad68f639e26
ethereal-gnome-0.99.0-EL3.2.ia64.rpm     MD5: 0cea4366de8984b618983029774c0d5d
 
x86_64:
ethereal-0.99.0-EL3.2.x86_64.rpm     MD5: 309c8d38e5d4e93f249334042280cea4
ethereal-gnome-0.99.0-EL3.2.x86_64.rpm     MD5: 8449be413e04b25fd845f24e22296e32
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
ethereal-0.99.0-EL4.2.src.rpm     MD5: 11c84a1dffe6e776982f1894ec5cf408
 
IA-32:
ethereal-0.99.0-EL4.2.i386.rpm     MD5: 0e681119d0612fde2ba2eba5c37d48a5
ethereal-gnome-0.99.0-EL4.2.i386.rpm     MD5: edfe88be11e00c7bab18e67d8532eccb
 
IA-64:
ethereal-0.99.0-EL4.2.ia64.rpm     MD5: 728dc11278e78320d26696c253168d4b
ethereal-gnome-0.99.0-EL4.2.ia64.rpm     MD5: 8059bb8d6f03b25f01293cf60804c57e
 
x86_64:
ethereal-0.99.0-EL4.2.x86_64.rpm     MD5: 5ebe9b3c26db1f789d9ca53a11be3fdb
ethereal-gnome-0.99.0-EL4.2.x86_64.rpm     MD5: f881c98450c85c7d7cf29cf5f2c38bf9
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
ethereal-0.99.0-AS21.2.src.rpm     MD5: b5455c25efc4a410310c0c085c00b706
 
IA-64:
ethereal-0.99.0-AS21.2.ia64.rpm     MD5: 2c7cf48fd665437ca174ab1691c3e001
ethereal-gnome-0.99.0-AS21.2.ia64.rpm     MD5: 8d9ece756ff3abe8fc079addaabf8026
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

189906 - CVE-2006-1932 Multiple ethereal issues (CVE-2006-1933, CVE-2006-1934, CVE-2006-1935, CVE-2006-1936, CVE-2006-1937, CVE-2006-1938, CVE-2006-1939, CVE-2006-1940)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/