drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberläufe in ethereal
Name: |
Pufferüberläufe in ethereal
|
|
ID: |
CSSA-2002-037.0 |
|
Distribution: |
Caldera |
|
Plattformen: |
Caldera Server 3.1, Caldera Workstation 3.1, Caldera Server 3.1.1, Caldera Workstation 3.1.1 |
|
Datum: |
Fr, 25. Oktober 2002, 13:00 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
Wireshark |
|
Originalnachricht |
--69pVuxX8awAiJ7fD Content-Disposition: inline
To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@linuxsecurity.com full-disclosure@lists.netsys.com
______________________________________________________________________________
SCO Security Advisory
Subject: Linux: various packet handling vunerabilities in ethereal Advisory number: CSSA-2002-037.0 Issue date: 2002 October 24 Cross reference: ______________________________________________________________________________
1. Problem Description
The ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a certain malformed packet, which causes Ethereal to allocate memory incorrectly, possibly due to zero-length fields.
SMB dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via malformed packets that cause Ethereal to dereference a NULL pointer.
Buffer overflow in X11 dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code while Ethereal is parsing keysyms.
DNS dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet that causes Ethereal to enter an infinite loop.
Vulnerability in GIOP dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (memory consumption).
2. Vulnerable Supported Versions
System Package ----------------------------------------------------------------------
OpenLinux 3.1.1 Server prior to ethereal-0.9.4-1.i386.rpm
OpenLinux 3.1.1 Workstation prior to ethereal-0.9.4-1.i386.rpm
OpenLinux 3.1 Server prior to ethereal-0.9.4-1.i386.rpm
OpenLinux 3.1 Workstation prior to ethereal-0.9.4-1.i386.rpm
3. Solution
The proper solution is to install the latest packages. Many customers find it easier to use the Caldera System Updater, called cupdate (or kcupdate under the KDE environment), to update these packages rather than downloading and installing them by hand.
4. OpenLinux 3.1.1 Server
4.1 Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-037.0/RPMS
4.2 Packages
9a40c4a30048082eddf7944d80ff4dbe ethereal-0.9.4-1.i386.rpm
4.3 Installation
rpm -Fvh ethereal-0.9.4-1.i386.rpm
4.4 Source Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-037.0/SRPMS
4.5 Source Packages
8f22f36b6603d154a09b7b3145d2d987 ethereal-0.9.4-1.src.rpm
5. OpenLinux 3.1.1 Workstation
5.1 Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-037.0/RPMS
5.2 Packages
9260d8dee3344ae25b29a149be6af9e1 ethereal-0.9.4-1.i386.rpm
5.3 Installation
rpm -Fvh ethereal-0.9.4-1.i386.rpm
5.4 Source Package Location
SRPMS
5.5 Source Packages
256b4438061bbae6aab557728e179ee4 ethereal-0.9.4-1.src.rpm
6. OpenLinux 3.1 Server
6.1 Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-037.0/RPMS
6.2 Packages
cc2c9ee1a4f25c264519061a937e0cda ethereal-0.9.4-1.i386.rpm
6.3 Installation
rpm -Fvh ethereal-0.9.4-1.i386.rpm
6.4 Source Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-037.0/SRPMS
6.5 Source Packages
e04a540fdddb2b48032d3ada7a5f6ae6 ethereal-0.9.4-1.src.rpm
7. OpenLinux 3.1 Workstation
7.1 Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-037.0/RPMS
7.2 Packages
2f13e3ae77bbfeabae68fe358ad120c6 ethereal-0.9.4-1.i386.rpm
7.3 Installation
rpm -Fvh ethereal-0.9.4-1.i386.rpm
7.4 Source Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-037.0/SRPMS
7.5 Source Packages
e18cd26d3cee11344e80432b9043b732 ethereal-0.9.4-1.src.rpm
8. References
Specific references for this advisory: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0353 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0401 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0402 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0403 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0404 http://www.ethereal.com/appnotes/enpa-sa-00004.html
SCO security resources: http://www.sco.com/support/security/index.html
This security fix closes SCO incidents sr863791, fz520851, erg712037.
9. Disclaimer
SCO is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of SCO products.
______________________________________________________________________________
--69pVuxX8awAiJ7fD Content-Disposition: inline
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (SCO_SV) Comment: For info see http://www.gnupg.org
iEYEARECAAYFAj24WawACgkQbluZssSXDTHHegCfT/PGej0NxhRVsOYR0Tqr5YjP y7kAoKEQCLQY37Cm5bktBuXoERL531LV =1IeV -----END PGP SIGNATURE-----
--69pVuxX8awAiJ7fD--
|
|
|
|