Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ethereal
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ethereal
ID: DSA-407-1
Distribution: Debian
Plattformen: Debian woody
Datum: Mo, 5. Januar 2004, 12:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0925
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1012
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1013
Applikationen: Wireshark

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

--------------------------------------------------------------------------
Debian Security Advisory DSA 407-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
January 5th, 2004 http://www.debian.org/security/faq
--------------------------------------------------------------------------

Package : ethereal
Vulnerability : buffer overflows
Problem-Type : remote
Debian-specific: no
CVE IDs : CAN-2003-0925 CAN-2003-0926 CAN-2003-0927 CAN-2003-1012
CAN-2003-1013

Several vulnerabilities were discovered upstream in ethereal, a
network traffic analyzer. The Common Vulnerabilities and Exposures
project identifies the following problems:

CAN-2003-0925

A buffer overflow allows remote attackers to cause a denial of
service and possibly execute arbitrary code via a malformed GTP
MSISDN string.

CAN-2003-0926

Via certain malformed ISAKMP or MEGACO packets remote attackers are
able to cause a denial of service (crash).

CAN-2003-0927

A heap-based buffer overflow allows remote attackers to cause a
denial of service (crash) and possibly execute arbitrary code via
the SOCKS dissector.

CAN-2003-1012

The SMB dissector allows remote attackers to cause a denial of
service via a malformed SMB packet that triggers a segmentation
fault during processing of selected packets.

CAN-2003-1013

The Q.931 dissector allows remote attackers to cause a denial of
service (crash) via a malformed Q.931, which triggers a null
dereference.

For the stable distribution (woody) this problem has been fixed in
version 0.9.4-1woody6.

For the unstable distribution (sid) this problem has been fixed in
version 0.10.0-1.

We recommend that you upgrade your ethereal and tethereal packages.


Upgrade Instructions
--------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
--------------------------------

Source archives:

ethereal_0.9.4-1woody6.dsc
Size/MD5 checksum: 679 6c3d2beab693578b827bc0c2ecc13eb2
ethereal_0.9.4-1woody6.diff.gz
Size/MD5 checksum: 37597 7456c1b4708a869295bb71480300370d
ethereal_0.9.4.orig.tar.gz
Size/MD5 checksum: 3278908 42e999daa659820ee93aaaa39ea1e9ea

Alpha architecture:

ethereal_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 1940256 e8a45a24a24a145f2870d65b26fdda20
ethereal-common_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 334238 0035322af1972fa6c1547e881b5b27fa
ethereal-dev_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 222006 da4e9538a37ac5dd740010b828afed8b
tethereal_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 1706878 3c2e6c03f6383f3ae8d599a01853c344

ARM architecture:

ethereal_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 1634664 f5f5d2aeba5fa26ac8d6b722f4d52b39
ethereal-common_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 297294 267317a8d6f43f009673f3e9864e0308
ethereal-dev_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 205964 fe0528d0ee4b0922d1a449f9c12c0b81
tethereal_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 1439166 390f1e6d9173454162195c47a10c6a0e

Intel IA-32 architecture:

ethereal_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 1512408 b9efde468cca1ddd6b731a3b343bd51d
ethereal-common_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 286370 c618774e3718d11d94347b0d66f72af4
ethereal-dev_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 198298 a7c01d2560880e783e899cd623a27e7a
tethereal_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 1325838 a7706f7f82b44a30d4a99b299c58b4ca

Intel IA-64 architecture:

ethereal_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 2150174 e2aba915304534ac4fbb060a2552d9c6
ethereal-common_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 373042 f06169aeefd918e4e5b809393edb8dc2
ethereal-dev_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 233630 e7f788d020319a8147beb4172cdc736f
tethereal_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 1860802 6c8ef685b4e61f34a0146eb6fc666fdb

HP Precision architecture:

ethereal_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 1803668 213d7f4221de714ee5c4ef938d0bae54
ethereal-common_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 322334 b6ebeeb39d2d57c0ed664f65389e55a2
ethereal-dev_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 216804 fd2e27b35aedd419a12db17bee96c596
tethereal_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 1575270 f3ed65cc62fb1155e8e38a25320d0614

Motorola 680x0 architecture:

ethereal_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 1424112 69cccce7cf5ead38369e6d508031d821
ethereal-common_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 282604 e5c3264948cd2cad0c159893173f0748
ethereal-dev_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 195028 647f483dbf79dc47a95d48d105d6a7c4
tethereal_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 1248072 8085433927ed54f1c1c8196d7c835709

Big endian MIPS architecture:

ethereal_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 1616398 9a41bb228b9b33894825d6cfd2bba741
ethereal-common_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 305168 b4a94497386ab45e0494c7980def8e3e
ethereal-dev_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 213590 20a3ad3d4b5126890aa23179c1730f1a
tethereal_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 1421550 ad0decba7ea5907e6a3149cacbc178f8

Little endian MIPS architecture:

ethereal_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 1596866 0321997c79a03298c65548bb5687e87d
ethereal-common_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 304676 9a3fad3fe8394ae63f79d09580b41b39
ethereal-dev_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 213222 28bfeefdf54278545c2c132fe381dc12
tethereal_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 1405698 182282caefb7aaf8025559894d7b9801

PowerPC architecture:

ethereal_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 1617784 38000a653b7da7552904e66b8c736ecc
ethereal-common_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 301846 70dede9038a6098642119765c87f6f80
ethereal-dev_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 208786 d69f6942493800fd491e90605d0be931
tethereal_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 1418638 9394c10dff060a961329382c7a3433ad

IBM S/390 architecture:

ethereal_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 1574214 a21cbd59b1d36e14da777da012768f21
ethereal-common_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 300674 49a6af1c59fe07065267ebc5deecc8b8
ethereal-dev_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 203854 077f9492da7509958c890e598edadf14
tethereal_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 1386518 d99962a50a8fafc9c509a67adb3399be

Sun Sparc architecture:

ethereal_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 1582634 d0a792b3c2428ac28476799e888cef98
ethereal-common_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 317982 936008ca75fecdec66519475f8466525
ethereal-dev_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 204626 2633099c059446cff5d41703718fb7bf
tethereal_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 1388944 ede08f8bc62f1a5141a0bb2ed2ceea1d


These files will probably be moved into the stable distribution on
its next revision.

--------------------------------------------------------------------------------
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-securitydists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/+TD0W5ql+IAeqTIRAqbDAJ94AyY1dCtH0gsTSd+lPuuNsgsYnACdGQXl
ukugrDm00ja/05LtjROk2ys=
=4uYr
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung