Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ethereal
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ethereal
ID: MDKSA-2005:131
Distribution: Mandriva
Plattformen: Mandriva 10.1, Mandriva 10.2
Datum: Fr, 5. August 2005, 13:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2360
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2361
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2362
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2363
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2364
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2365
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2366
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2367
http://www.ethereal.com/appnotes/enpa-sa-00020.html
Applikationen: Wireshark

Originalnachricht

This is a multi-part message in MIME format...

------------=_1123196422-740-6310

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Update Advisory
_______________________________________________________________________

Package name: ethereal
Advisory ID: MDKSA-2005:131
Date: August 4th, 2005

Affected versions: 10.1, 10.2
______________________________________________________________________

Problem Description:

A number of vulnerabilities were discovered in versions of Ethereal
prior to version 0.10.12, including:

The SMB dissector could overflow a buffer or exhaust memory
(CAN-2005-2365).

iDefense discovered that several dissectors are vulnerable to
format string overflows (CAN-2005-2367).

A number of other portential crash issues in various dissectors
have also been corrected.

This update provides Ethereal 0.10.12 which is not vulnerable to these
issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2360
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2361
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2362
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2363
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2364
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2365
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2366
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2367
http://www.ethereal.com/appnotes/enpa-sa-00020.html
______________________________________________________________________

Updated Packages:

Mandrakelinux 10.1:
f6931a74612db92aa0d4615960214854
10.1/RPMS/ethereal-0.10.12-0.1.101mdk.i586.rpm
f8e815399aa508bf8d1fe03e19e3e8ef
10.1/RPMS/ethereal-tools-0.10.12-0.1.101mdk.i586.rpm
00383dd9ea00d5cde9b64d0d6f03efb0
10.1/RPMS/libethereal0-0.10.12-0.1.101mdk.i586.rpm
9bcdac91996cbbb02368c220b86de184
10.1/RPMS/tethereal-0.10.12-0.1.101mdk.i586.rpm
feacd9f7018da58e7ff3110c2c3a96f3
10.1/SRPMS/ethereal-0.10.12-0.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
f17ca7252e3face05e6228848385b203
x86_64/10.1/RPMS/ethereal-0.10.12-0.1.101mdk.x86_64.rpm
9b13e9b5b6320ea4eb9a83322f1a098f
x86_64/10.1/RPMS/ethereal-tools-0.10.12-0.1.101mdk.x86_64.rpm
d1d7606243229d77ab94632493ab5c12
x86_64/10.1/RPMS/lib64ethereal0-0.10.12-0.1.101mdk.x86_64.rpm
cf99953e73c3fb87fdca96fbb01e8897
x86_64/10.1/RPMS/tethereal-0.10.12-0.1.101mdk.x86_64.rpm
feacd9f7018da58e7ff3110c2c3a96f3
x86_64/10.1/SRPMS/ethereal-0.10.12-0.1.101mdk.src.rpm

Mandrakelinux 10.2:
5397caa26eaaa2760d6cf2b7f88da399
10.2/RPMS/ethereal-0.10.12-0.1.102mdk.i586.rpm
7c8b866673c056603666296737e1938f
10.2/RPMS/ethereal-tools-0.10.12-0.1.102mdk.i586.rpm
6de8272b6bd220ef4acd91dd7f09620b
10.2/RPMS/libethereal0-0.10.12-0.1.102mdk.i586.rpm
b2a94687155df4359cc7b480d4a49e64
10.2/RPMS/tethereal-0.10.12-0.1.102mdk.i586.rpm
6af1afa58f0effe14bf02adbb3b3620a
10.2/SRPMS/ethereal-0.10.12-0.1.102mdk.src.rpm

Mandrakelinux 10.2/X86_64:
ffcfdc52a177e3cdc38457f9cda8ae6f
x86_64/10.2/RPMS/ethereal-0.10.12-0.1.102mdk.x86_64.rpm
1d4d5bc3bdb9412d5224bd54ba161ad3
x86_64/10.2/RPMS/ethereal-tools-0.10.12-0.1.102mdk.x86_64.rpm
cf7a1d7610c4443d1d2d1f2859bda528
x86_64/10.2/RPMS/lib64ethereal0-0.10.12-0.1.102mdk.x86_64.rpm
34d6fc3ecd5481dcdb8e1746c74d696f
x86_64/10.2/RPMS/tethereal-0.10.12-0.1.102mdk.x86_64.rpm
6af1afa58f0effe14bf02adbb3b3620a
x86_64/10.2/SRPMS/ethereal-0.10.12-0.1.102mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFC8p2UmqjQ0CJFipgRAvmbAJ9YLRV08jpwKPL5WCkjT1sEXSFsagCfUqDm
Rq9olMMt2meDVDrSCrfpvag=
=I6yL
-----END PGP SIGNATURE-----


------------=_1123196422-740-6310
Content-Disposition: inline; filename="message.footer"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________



------------=_1123196422-740-6310--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung