Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Mandrake Linux Advisory: ethereal

Apr 25, 2003, 12:58 (0 Talkback[s])

______________________________________________________________________

                Mandrake Linux Security Update Advisory
______________________________________________________________________

Package name:           ethereal
Advisory ID:            MDKSA-2003:051
Date:                   March 24th, 2003

Affected versions:      9.1
______________________________________________________________________

Problem Description:

 A vulnerability was discovered in Ethereal 0.9.9 and earlier that
 allows a remote attacker to use specially crafted SOCKS packets to
 cause a denial of service (DoS) and possibly execute arbitrary
 code.
 
 A similar vulnerability also exists in the NTLMSSP code in Ethereal
 0.9.9 and earlier, due to a heap-based buffer overflow.
______________________________________________________________________

References:
  
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0081
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0159
  http://www.ethereal.com/appnotes/enpa-sa-00008.html
______________________________________________________________________

Updated Packages:
  
 Mandrake Linux 9.1:
 0305a98a99d02249cf4394e0813530ce  9.1/RPMS/ethereal-0.9.11-1.1mdk.i586.rpm
 10959548f2d2b3b0b8098669511611bb  9.1/SRPMS/ethereal-0.9.11-1.1mdk.src.rpm

 Mandrake Linux 9.1/PPC:
 b1a6d31b7bae110678b4715e0e83a042  ppc/9.1/RPMS/ethereal-0.9.11-1.1mdk.ppc.rpm
 10959548f2d2b3b0b8098669511611bb  ppc/9.1/SRPMS/ethereal-0.9.11-1.1mdk.src.rpm
______________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
______________________________________________________________________

To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".  A list of
FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig <filename>

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team from:

  https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

  http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>