---

Red Hat Linux Advisory: ethereal


Red Hat Security Advisory

Synopsis: Updated Ethereal packages fix security issues
Advisory ID: RHSA-2004:001-01
Issue date: 2004-01-07
Updated on: 2004-01-07
Product: Red Hat Linux
Keywords:  
Cross references:  
Obsoletes: RHSA-2003:323
CVE Names: CAN-2003-1012 CAN-2003-1013

1. Topic:

Updated Ethereal packages that fix two security vulnerabilities
are now available.

2. Relevant releases/architectures:

Red Hat Linux 9 – i386

3. Problem description:

Ethereal is a program for monitoring network traffic.

Two security issues have been found that affect Ethereal. By
exploiting these issues it may be possible to make Ethereal crash
by injecting an intentionally malformed packet onto the wire or by
convincing someone to read a malformed packet trace file. It is not
known if these issues could allow arbitrary code execution.

The SMB dissector in Ethereal before 0.10.0 allows remote
attackers to cause a denial of service via a malformed SMB packet
that triggers a segmentation fault during processing of Selected
packets. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name
CAN-2003-1012 to this issue.

The Q.931 dissector in Ethereal before 0.10.0 allows remote
attackers to cause a denial of service (crash) via a malformed
Q.931, which triggers a null dereference. The Common
Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name
CAN-2003-1013 to this issue.

Users of Ethereal should update to these erratum packages
containing Ethereal version 0.10.0, which is not vulnerable to
these issues.

4. Solution:

Before applying this update, make sure all previously released
errata relevant to your system have been applied.

Please note that this update is available via Red Hat Network.
To use Red Hat Network, launch the Red Hat Update Agent with the
following command:

up2date

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.

5. RPMs required:

Red Hat Linux 9:

SRPMS:

ftp://updates.redhat.com/9/en/os/SRPMS/ethereal-0.10.0a-0.90.1.src.rpm

i386:

ftp://updates.redhat.com/9/en/os/i386/ethereal-0.10.0a-0.90.1.i386.rpm


ftp://updates.redhat.com/9/en/os/i386/ethereal-gnome-0.10.0a-0.90.1.i386.rpm

6. Verification:

MD5 sum Package Name


cf02fe0315dcfa46f79c5fbf379a6225
9/en/os/SRPMS/ethereal-0.10.0a-0.90.1.src.rpm
f7e4fe4f9a4cb47a2e6b42b5cfed5ce3
9/en/os/i386/ethereal-0.10.0a-0.90.1.i386.rpm
686d115defe1ec92cc7a49ffe80bfbe4
9/en/os/i386/ethereal-gnome-0.10.0a-0.90.1.i386.rpm

These packages are GPG signed by Red Hat for security. Our key
is available from https://www.redhat.com/security/keys.html

You can verify each package with the following command:

rpm –checksig -v <filename>

If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:

md5sum <filename>

7. References:

http://www.ethereal.com/appnotes/enpa-sa-00012.html

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1012

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1013

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More
contact details at https://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis