Linux Today: Linux News On Internet Time.

More on LinuxToday

Debian GNU/Linux Advisory: ethereal

Sep 06, 2002, 17:24 (0 Talkback[s])

- --------------------------------------------------------------------------
Debian Security Advisory DSA 162-1                                        Martin Schulze
September 6th, 2002           
- --------------------------------------------------------------------------

Package        : ethereal
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE Id         : CAN-2002-0834
BugTraq Id     : 5573

Ethereal developers discovered a buffer overflow in the ISIS protocol
dissector.  It may be possible to make Ethereal crash or hang by
injecting a purposefully malformed packet onto the wire, or by
convincing someone to read a malformed packet trace file.  It may be
possible to make Ethereal run arbitrary code by exploiting the buffer
and pointer problems.

This problem has been fixed in version 0.9.4-1woody2 for the current
stable stable distribution (woody), in version 0.8.0-4potato.1 for
the old stable distribution (potato) and in version 0.9.6-1 for the
unstable distribution (sid).

We recommend that you upgrade your ethereal packages.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 2.2 alias potato
- --------------------------------

  Source archives:
      Size/MD5 checksum:      628 ab3421f7cfe2592bcae97ee21d2037f0
      Size/MD5 checksum:    52487 8f845d3572e699bd09ed8b7590ef5c8c
      Size/MD5 checksum:  1033560 297ae32cc23a154497dad6a1f964bdb1

  Alpha architecture:
      Size/MD5 checksum:   725082 8ce2153f5f27d7f6c22aa45187c85a6b

  ARM architecture:
      Size/MD5 checksum:   559580 da451f098a62af65f67c5c93dedff929

  Intel IA-32 architecture:
      Size/MD5 checksum:   520452 c04c0c6253dc91ea8f773cb1607258df

  Motorola 680x0 architecture:
      Size/MD5 checksum:   489770 dd7d17f57ed7b44922453f72d483c55d

  PowerPC architecture:
      Size/MD5 checksum:   573334 13d6a9f30560b0d7056bb2938d62c5bf

  Sun Sparc architecture:
      Size/MD5 checksum:   554286 7540dd04b2f43db168b579a5b5e4640e

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      679 3422eaafcc0c6790921c2fadcfb45c21
      Size/MD5 checksum:    34257 9ba55fbe1973fa07eaea17ceddb0a47b
      Size/MD5 checksum:  3278908 42e999daa659820ee93aaaa39ea1e9ea

  Alpha architecture:
      Size/MD5 checksum:  1939060 dfb7750119b7688c3d8d8650d17f0d7c
      Size/MD5 checksum:   333594 56dff0c9ce5c97aa17b7ddec5764fc7e
      Size/MD5 checksum:   221390 7387c42257ef764a2ff02af5f6f10800
      Size/MD5 checksum:  1705962 f8269a5cb64515afe3a4c898e2e35b81

  ARM architecture:
      Size/MD5 checksum:  1633044 e90d102738aeb2534c7e70acb7873c73
      Size/MD5 checksum:   296362 20785f615601377d95a35c18509428c8
      Size/MD5 checksum:   205268 cc1809339123e98a18c068214e46ba84
      Size/MD5 checksum:  1437240 8ca230be12a78181179c50ec59f14019

  Intel IA-32 architecture:
      Size/MD5 checksum:  1511486 dc02fd03fa24a93e5aefa5db2fb3c38f
      Size/MD5 checksum:   285708 fead37813e0a8b27b2d198ed96a09e72
      Size/MD5 checksum:   197506 3e35362ff31f9c8831da433664a87793
      Size/MD5 checksum:  1324234 589dbb41e4b8be0b6f59e1d5029a4534

  Intel IA-64 architecture:
      Size/MD5 checksum:  2148514 346ba1362fee8a9384ec622a90ca4da8
      Size/MD5 checksum:   372474 d71f6a54b81e9a02fa90fe9d9f655fac
      Size/MD5 checksum:   232940 8631b791d6ea4745ec5f9391f1342964
      Size/MD5 checksum:  1858670 0748a27f6467eed6e3b990c38adb8ae4

  HP Precision architecture:
      Size/MD5 checksum:  1801788 490b5d284861576248e1f4b0dc68f23d
      Size/MD5 checksum:   321500 dcf0dcbf57aa1974b34ca2a9282226d5
      Size/MD5 checksum:   216122 feebbfda5ae79df0a6319aa91eefad69
      Size/MD5 checksum:  1574400 f6c277ee39939222422ccf22c405cdcc

  Motorola 680x0 architecture:
      Size/MD5 checksum:  1422128 52618cb598d1cb02aab4265fa1a1e109
      Size/MD5 checksum:   281842 093f64d0bfd4f7e285649f085ed23c9e
      Size/MD5 checksum:   194400 157b134dea7ae457bb1b45e0c5700761
      Size/MD5 checksum:  1246528 cc2467a18ff370127eda708863498e7c

  Big endian MIPS architecture:
      Size/MD5 checksum:  1615518 39e888789a4e9b5ae41e9dd9f34d8a70
      Size/MD5 checksum:   304542 f150ce7984701d180e72c9119df878d9
      Size/MD5 checksum:   212856 20e638a8b96d5f6261145f0a2d7aa61b
      Size/MD5 checksum:  1420690 2953c5e2019b980f34e3cda644423791

  Little endian MIPS architecture:
      Size/MD5 checksum:  1595962 116c1f6662b30ce208e0b911e0a48abd
      Size/MD5 checksum:   304078 e6c2ee04916033005787227a6a9ff249
      Size/MD5 checksum:   212514 c8cc996cbe70c49b381f4094ab79a0fd
      Size/MD5 checksum:  1404638 e7de537c62efa30669c622df80eb0cfa

  PowerPC architecture:
      Size/MD5 checksum:  1616370 d06e81e77f2b378354b7109cfff3999e
      Size/MD5 checksum:   301234 3ad14331ebbc28828bfe8d86d06d39d3
      Size/MD5 checksum:   208070 003a9293509b86352699297f2dcd06a1
      Size/MD5 checksum:  1417096 f8e168e799a3513a4c6c4e5978b48997

  IBM S/390 architecture:
      Size/MD5 checksum:  1531624 8d1247e48022c9eca049d6f82fa27b0c
      Size/MD5 checksum:   294854 79dfa75bd8dc5594ba00ec45ff018621
      Size/MD5 checksum:   200804 e16d387f4b152dd66c9942b2b4a63ab8
      Size/MD5 checksum:  1347014 69976bdae0c3f1747e0ef505f99b9685

  Sun Sparc architecture:
      Size/MD5 checksum:  1580330 957aa365762f5597bbd0b4b504b0b8b1
      Size/MD5 checksum:   317396 a3a32b25fb8e461c51b6c7f1b4b769f0
      Size/MD5 checksum:   203866 c29c5dfd294938398b73ecdc1e5a868f
      Size/MD5 checksum:  1387140 6c89ba3a017d51ffbb58c0db6e3c6504

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>;