SOT Linux Advisory: etherealFeb 09, 2004, 20:59 (0 Talkback[s])
SOT Linux Security Advisory
Ethereal is a network traffic analyzer for Unix-ish operating systems.
The SMB dissector in Ethereal before 0.10.0 allows remote attackers to cause a denial of service via a malformed SMB packet that triggers a segmentation fault during processing of Selected packets. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2003-1012 to this issue.
The Q.931 dissector in Ethereal before 0.10.0 allows remote attackers to cause a denial of service (crash) via a malformed Q.931, which triggers a null dereference. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2003-1013 to this issue. Users of tcpdump should update to these update packages, which contain a backported security patch that corrects this issue.
Users of ethereal should update to these update packages, which contain a backported security patch that corrects this issue.
2. Updated packages
SOT Linux 2003 Server:
3. Upgrading package
Before applying this update, make sure all previously released errata relevant to your system have been applied.
Use up2date to automatically upgrade the fixed packages.
If you want to upgrade manually, download the updated package from the SOT Linux FTP site (use the links above) or from one of our mirrors. The list of mirrors can be obtained at www.sot.com/en/linux
Update the package with the following command: rpm -Uvh <filename>
All packages are PGP signed by SOT for security.
You can verify each package with the following command: rpm --checksig <filename>
If you wish to verify the integrity of the downloaded package, run "md5sum <filename>" and compare the output with data given below.
Package Name MD5 sum
Copyright(c) 2001-2003 SOT
0 Talkback[s] (click to add your comment)