-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: wireshark security update Advisory ID: RHSA-2008:0059-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0059.html Issue date: 2008-01-21 CVE Names: CVE-2007-3389 CVE-2007-3390 CVE-2007-3391 CVE-2007-3392 CVE-2007-3393 CVE-2007-6113 CVE-2007-6114 CVE-2007-6115 CVE-2007-6117 CVE-2007-6118 CVE-2007-6120 CVE-2007-6121 CVE-2007-6450 CVE-2007-6451 =====================================================================
1. Summary:
Updated wireshark packages that fix several security issues are now available for Red Hat Enterprise Linux 3.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Description:
Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal.
Several flaws were found in Wireshark. Wireshark could crash or possibly execute arbitrary code as the user running Wireshark if it read a malformed packet off the network. (CVE-2007-6114, CVE-2007-6115, CVE-2007-6117)
Several denial of service bugs were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off the network. (CVE-2007-3389, CVE-2007-3390, CVE-2007-3391, CVE-2007-3392, CVE-2007-3392, CVE-2007-3393, CVE-2007-6113, CVE-2007-6118, CVE-2007-6120, CVE-2007-6121, CVE-2007-6450, CVE-2007-6451)
As well, Wireshark switched from using net-snmp to libsmi, which is included in this errata.
Users of wireshark should upgrade to these updated packages, which contain Wireshark version 0.99.7, and resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188
5. Bugs fixed (http://bugzilla.redhat.com/):
245796 - CVE-2007-3389 Wireshark crashes when inspecting HTTP traffic 245797 - CVE-2007-3391 Wireshark loops infinitely when inspecting DCP ETSI traffic 245798 - CVE-2007-3392 Wireshark loops infinitely when inspecting SSL traffic 246221 - CVE-2007-3393 Wireshark corrupts the stack when inspecting BOOTP traffic 246225 - CVE-2007-3390 Wireshark crashes when inspecting iSeries traffic 246229 - CVE-2007-3392 Wireshark crashes when inspecting MMS traffic 397281 - CVE-2007-6113 wireshark DNP3 flaws 397291 - CVE-2007-6114 wireshark SSL and OS/400 trace flaws 397311 - CVE-2007-6115 wireshark ANSI MAP flaws 397331 - CVE-2007-6117 wireshark HTTP dissector flaws 397341 - CVE-2007-6118 wireshark MEGACO dissector flaws 397361 - CVE-2007-6120 wireshark Bluetooth SDP dissector flaws 397371 - CVE-2007-6121 wireshark RPC Portmap flaws 426337 - Wireshare rebase requires new libsmi package adding to rhel3 427253 - CVE-2007-6450 wireshark RPL dissector crash 427254 - CVE-2007-6451 wireshark CIP dissector crash
6. Package List:
Red Hat Enterprise Linux AS version 3:
Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/libsmi-0.4.5-3.el3.src.rpm wireshark-0.99.7-EL3.1.src.rpm
i386: libsmi-0.4.5-3.el3.i386.rpm libsmi-debuginfo-0.4.5-3.el3.i386.rpm libsmi-devel-0.4.5-3.el3.i386.rpm wireshark-0.99.7-EL3.1.i386.rpm wireshark-debuginfo-0.99.7-EL3.1.i386.rpm wireshark-gnome-0.99.7-EL3.1.i386.rpm
ia64: libsmi-0.4.5-3.el3.ia64.rpm libsmi-debuginfo-0.4.5-3.el3.ia64.rpm libsmi-devel-0.4.5-3.el3.ia64.rpm wireshark-0.99.7-EL3.1.ia64.rpm wireshark-debuginfo-0.99.7-EL3.1.ia64.rpm wireshark-gnome-0.99.7-EL3.1.ia64.rpm
ppc: libsmi-0.4.5-3.el3.ppc.rpm libsmi-debuginfo-0.4.5-3.el3.ppc.rpm libsmi-devel-0.4.5-3.el3.ppc.rpm wireshark-0.99.7-EL3.1.ppc.rpm wireshark-debuginfo-0.99.7-EL3.1.ppc.rpm wireshark-gnome-0.99.7-EL3.1.ppc.rpm
s390: libsmi-0.4.5-3.el3.s390.rpm libsmi-debuginfo-0.4.5-3.el3.s390.rpm libsmi-devel-0.4.5-3.el3.s390.rpm wireshark-0.99.7-EL3.1.s390.rpm wireshark-debuginfo-0.99.7-EL3.1.s390.rpm wireshark-gnome-0.99.7-EL3.1.s390.rpm
s390x: libsmi-0.4.5-3.el3.s390x.rpm libsmi-debuginfo-0.4.5-3.el3.s390x.rpm libsmi-devel-0.4.5-3.el3.s390x.rpm wireshark-0.99.7-EL3.1.s390x.rpm wireshark-debuginfo-0.99.7-EL3.1.s390x.rpm wireshark-gnome-0.99.7-EL3.1.s390x.rpm
x86_64: libsmi-0.4.5-3.el3.x86_64.rpm libsmi-debuginfo-0.4.5-3.el3.x86_64.rpm libsmi-devel-0.4.5-3.el3.x86_64.rpm wireshark-0.99.7-EL3.1.x86_64.rpm wireshark-debuginfo-0.99.7-EL3.1.x86_64.rpm wireshark-gnome-0.99.7-EL3.1.x86_64.rpm
Red Hat Desktop version 3:
Source: libsmi-0.4.5-3.el3.src.rpm wireshark-0.99.7-EL3.1.src.rpm
i386: libsmi-0.4.5-3.el3.i386.rpm libsmi-debuginfo-0.4.5-3.el3.i386.rpm libsmi-devel-0.4.5-3.el3.i386.rpm wireshark-0.99.7-EL3.1.i386.rpm wireshark-debuginfo-0.99.7-EL3.1.i386.rpm wireshark-gnome-0.99.7-EL3.1.i386.rpm
x86_64: libsmi-0.4.5-3.el3.x86_64.rpm libsmi-debuginfo-0.4.5-3.el3.x86_64.rpm libsmi-devel-0.4.5-3.el3.x86_64.rpm wireshark-0.99.7-EL3.1.x86_64.rpm wireshark-debuginfo-0.99.7-EL3.1.x86_64.rpm wireshark-gnome-0.99.7-EL3.1.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/libsmi-0.4.5-3.el3.src.rpm wireshark-0.99.7-EL3.1.src.rpm
i386: libsmi-0.4.5-3.el3.i386.rpm libsmi-debuginfo-0.4.5-3.el3.i386.rpm libsmi-devel-0.4.5-3.el3.i386.rpm wireshark-0.99.7-EL3.1.i386.rpm wireshark-debuginfo-0.99.7-EL3.1.i386.rpm wireshark-gnome-0.99.7-EL3.1.i386.rpm
ia64: libsmi-0.4.5-3.el3.ia64.rpm libsmi-debuginfo-0.4.5-3.el3.ia64.rpm libsmi-devel-0.4.5-3.el3.ia64.rpm wireshark-0.99.7-EL3.1.ia64.rpm wireshark-debuginfo-0.99.7-EL3.1.ia64.rpm wireshark-gnome-0.99.7-EL3.1.ia64.rpm
x86_64: libsmi-0.4.5-3.el3.x86_64.rpm libsmi-debuginfo-0.4.5-3.el3.x86_64.rpm libsmi-devel-0.4.5-3.el3.x86_64.rpm wireshark-0.99.7-EL3.1.x86_64.rpm wireshark-debuginfo-0.99.7-EL3.1.x86_64.rpm wireshark-gnome-0.99.7-EL3.1.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/libsmi-0.4.5-3.el3.src.rpm wireshark-0.99.7-EL3.1.src.rpm
i386: libsmi-0.4.5-3.el3.i386.rpm libsmi-debuginfo-0.4.5-3.el3.i386.rpm libsmi-devel-0.4.5-3.el3.i386.rpm wireshark-0.99.7-EL3.1.i386.rpm wireshark-debuginfo-0.99.7-EL3.1.i386.rpm wireshark-gnome-0.99.7-EL3.1.i386.rpm
ia64: libsmi-0.4.5-3.el3.ia64.rpm libsmi-debuginfo-0.4.5-3.el3.ia64.rpm libsmi-devel-0.4.5-3.el3.ia64.rpm wireshark-0.99.7-EL3.1.ia64.rpm wireshark-debuginfo-0.99.7-EL3.1.ia64.rpm wireshark-gnome-0.99.7-EL3.1.ia64.rpm
x86_64: libsmi-0.4.5-3.el3.x86_64.rpm libsmi-debuginfo-0.4.5-3.el3.x86_64.rpm libsmi-devel-0.4.5-3.el3.x86_64.rpm wireshark-0.99.7-EL3.1.x86_64.rpm wireshark-debuginfo-0.99.7-EL3.1.x86_64.rpm wireshark-gnome-0.99.7-EL3.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451 http://www.wireshark.org/docs/relnotes/wireshark-0.99.7.html http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHlGdXXlSAg2UNWIIRAkDUAKCBpR3dJYe6U39tZViXyHXeq9dsmwCfZTdk jI/URTMF2Yhq/Q2Z0xbZ2Oc= =ucIE -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|