From secure@conectiva.com.br Mon Mar 28 15:42:15 2005 From: Conectiva Updates To: conectiva-updates@perninha.conectiva.com.br, lwn@lwn.net, bugtraq@securityfocus.com, security-alerts@linuxsecurity.com, linsec@lists.seifried.org Date: Mon, 28 Mar 2005 13:56:33 -0300 Subject: [CLA-2005:942] Conectiva Security Announcement - ethereal -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : ethereal SUMMARY : Fixes for security vulnerabilities in ethereal DATE : 2005-03-28 13:52:00 ID : CLA-2005:942 RELEVANT RELEASES : 9, 10 - ------------------------------------------------------------------------- DESCRIPTION Ethereal[1] is a powerful network traffic analyzer with a graphical user interface (GUI). This update fixes several vulnerabilities[2,3] in ethereal: CAN-2005-0006[4]: The COPS dissector could go into an infinite loop. CAN-2005-0007[5]: The DLSw dissector could cause an assertion, making Ethereal exit prematurely. CAN-2005-0008[6]: The DNP dissector could cause memory corruption. CAN-2005-0009[7]: The Gnutella dissector could cause an assertion, making Ethereal exit prematurely. CAN-2005-0010[8]: The MMSE dissector could free static memory. CAN-2005-0084[9]: The X11 protocol dissector is vulnerable to a string buffer overflow. CAN-2005-0699[10]: Diego Giago discovered a buffer overflow in the 3GPP2 A11 dissector. CAN-2005-0704[11]: Matevz Pustisek discovered a buffer overflow in the Etheric dissector. CAN-2005-0705[12]: The GPRS-LLC dissector could crash if the "ignore cipher bit" option was enabled. CAN-2005-0739[13]: Leon Juranic discovered a buffer overflow in the IAPP dissector. Also, it fixes other two issues: a bug in the JXTA and sFlow dissectors that could make Ethereal crash. SOLUTION It is recommended that all ethereal users upgrade their packages. REFERENCES 1.http://www.ethereal.com/ 2.http://www.ethereal.com/appnotes/enpa-sa-00017.html 3.http://www.ethereal.com/appnotes/enpa-sa-00018.html 4.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0006 5.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0007 6.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0008 7.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0009 8.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0010 9.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0084 10.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0699 11.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0704 12.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0705 13.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0739 UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/10/SRPMS/ethereal-0.10.10-77079U10_3cl.src.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/ethereal-0.10.10-77079U10_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/ethereal-common-0.10.10-77079U10_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/ethereal-gtk-0.10.10-77079U10_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/ethereal-utils-0.10.10-77079U10_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/tethereal-0.10.10-77079U10_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/SRPMS/ethereal-0.10.10-77079U90_5cl.src.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/ethereal-0.10.10-77079U90_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/ethereal-common-0.10.10-77079U90_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/ethereal-gtk-0.10.10-77079U90_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/ethereal-utils-0.10.10-77079U90_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/tethereal-0.10.10-77079U90_5cl.i386.rpm ADDITIONAL INSTRUCTIONS The apt tool can be used to perform RPM packages upgrades: - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions regarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- Copyright (c) 2004 Conectiva Inc. http://www.conectiva.com - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQFCSDc/42jd0JmAcZARAtT2AJ9CfAnH48ketSlgLrjR/iKLyPdoWACg1rXe eI8d4mT9sAyuc3Im4fqCwyI= =tztA -----END PGP SIGNATURE-----