Red Hat Linux Advisory: EtherealNov 11, 2003, 15:57 (2 Talkback[s])
Red Hat Security Advisory
Updated Ethereal packages that fix a number of exploitable security issues are now available.
2. Relevant releases/architectures:
Red Hat Linux 7.2 - i386, ia64
3. Problem description:
Ethereal is a program for monitoring network traffic.
A number of security issues affect Ethereal. By exploiting these issues, it may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully-malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
A buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed GTP MSISDN string. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2003-0925 to this issue.
Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service (crash) via certain malformed ISAKMP or MEGACO packets. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2003-0926 to this issue.
A heap-based buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the SOCKS dissector. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2003-0927 to this issue.
Users of Ethereal should update to these erratum packages containing Ethereal version 0.9.16, which is not vulnerable to these issues.
Before applying this update, make sure all previously released errata relevant to your system have been applied.
Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
5. RPMs required:
Red Hat Linux 7.2:
Red Hat Linux 7.3:
Red Hat Linux 8.0:
Red Hat Linux 9:
MD5 sum Package Name
These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/keys.html
You can verify each package with the following command:
rpm --checksig -v <filename>
If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:
The Red Hat security contact is <firstname.lastname@example.org>. More contact details at https://www.redhat.com/solutions/security/news/contact.html
Copyright 2003 Red Hat, Inc.
0 Talkback[s] (click to add your comment)