- Issued:
- 2005-02-15
- Updated:
- 2005-02-15
RHSA-2005:037 - Security Advisory
Synopsis
ethereal security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated Ethereal packages that fix various security vulnerabilities are now
available for Red Hat Enterprise Linux 4.
This update has been rated as having moderate security impact by the Red Hat
Security Response Team.
Description
Ethereal is a program for monitoring network traffic.
A number of security flaws have been discovered in Ethereal. On a system
where Ethereal is running, a remote attacker could send malicious packets
to trigger these flaws.
A flaw in the DICOM dissector could cause a crash. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-1139 to this issue.
A invalid RTP timestamp could hang Ethereal and create a large temporary
file, possibly filling available disk space. (CAN-2004-1140)
The HTTP dissector could access previously-freed memory, causing a crash.
(CAN-2004-1141)
An improperly formatted SMB packet could make Ethereal hang, maximizing CPU
utilization. (CAN-2004-1142)
The COPS dissector could go into an infinite loop. (CAN-2005-0006)
The DLSw dissector could cause an assertion, making Ethereal exit
prematurely. (CAN-2005-0007)
The DNP dissector could cause memory corruption. (CAN-2005-0008)
The Gnutella dissector could cause an assertion, making Ethereal exit
prematurely. (CAN-2005-0009)
The MMSE dissector could free static memory, causing a crash. (CAN-2005-0010)
The X11 protocol dissector is vulnerable to a string buffer overflow.
(CAN-2005-0084)
Users of Ethereal should upgrade to these updated packages which contain
version 0.10.9 that is not vulnerable to these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 144188 - CAN-2004-1139 Ethereal flaws (CAN-2004-1140 CAN-2004-1141 CAN-2004-1142)
- BZ - 145483 - CAN-2005-0006 multiple ethereal issues (CAN-2005-0007 CAN-2005-0008 CAN-2005-0009 CAN-2005-0010 CAN-2005-0084)
CVEs
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
ethereal-0.10.9-1.EL4.1.src.rpm | SHA-256: 1618f41759ee8d9711d326eaaac2ee234283eb3dcf277963e6b64850ea7e7d56 |
x86_64 | |
ethereal-0.10.9-1.EL4.1.x86_64.rpm | SHA-256: 3a00e5fc2d3b81112eacb9b3d419a7bdba695fc69b7fbc61ecc10bdb14395fe0 |
ethereal-0.10.9-1.EL4.1.x86_64.rpm | SHA-256: 3a00e5fc2d3b81112eacb9b3d419a7bdba695fc69b7fbc61ecc10bdb14395fe0 |
ethereal-gnome-0.10.9-1.EL4.1.x86_64.rpm | SHA-256: 91a6d0b52b450d7a1959347241a6f375a6e055a8d8c4c6d36be7f1b278b3400a |
ethereal-gnome-0.10.9-1.EL4.1.x86_64.rpm | SHA-256: 91a6d0b52b450d7a1959347241a6f375a6e055a8d8c4c6d36be7f1b278b3400a |
ia64 | |
ethereal-0.10.9-1.EL4.1.ia64.rpm | SHA-256: 636fa0d7042d02586bd36ba0985bfedf7f8289f16e5eb8531a4849046bf64a04 |
ethereal-0.10.9-1.EL4.1.ia64.rpm | SHA-256: 636fa0d7042d02586bd36ba0985bfedf7f8289f16e5eb8531a4849046bf64a04 |
ethereal-gnome-0.10.9-1.EL4.1.ia64.rpm | SHA-256: 14ecc5913a7c1a20977334a507f3d3fac0108d82dbbba952a9b3ea840b500b9c |
ethereal-gnome-0.10.9-1.EL4.1.ia64.rpm | SHA-256: 14ecc5913a7c1a20977334a507f3d3fac0108d82dbbba952a9b3ea840b500b9c |
i386 | |
ethereal-0.10.9-1.EL4.1.i386.rpm | SHA-256: 0fec11eedc4a2834e6f2c29e73ccbecc828ac103428ee6be0e9755a357ff1783 |
ethereal-0.10.9-1.EL4.1.i386.rpm | SHA-256: 0fec11eedc4a2834e6f2c29e73ccbecc828ac103428ee6be0e9755a357ff1783 |
ethereal-gnome-0.10.9-1.EL4.1.i386.rpm | SHA-256: 95d6cc9873a76574757d445a8b8279778cd875a313e15b40b9307a567447353c |
ethereal-gnome-0.10.9-1.EL4.1.i386.rpm | SHA-256: 95d6cc9873a76574757d445a8b8279778cd875a313e15b40b9307a567447353c |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
ethereal-0.10.9-1.EL4.1.src.rpm | SHA-256: 1618f41759ee8d9711d326eaaac2ee234283eb3dcf277963e6b64850ea7e7d56 |
x86_64 | |
ethereal-0.10.9-1.EL4.1.x86_64.rpm | SHA-256: 3a00e5fc2d3b81112eacb9b3d419a7bdba695fc69b7fbc61ecc10bdb14395fe0 |
ethereal-gnome-0.10.9-1.EL4.1.x86_64.rpm | SHA-256: 91a6d0b52b450d7a1959347241a6f375a6e055a8d8c4c6d36be7f1b278b3400a |
ia64 | |
ethereal-0.10.9-1.EL4.1.ia64.rpm | SHA-256: 636fa0d7042d02586bd36ba0985bfedf7f8289f16e5eb8531a4849046bf64a04 |
ethereal-gnome-0.10.9-1.EL4.1.ia64.rpm | SHA-256: 14ecc5913a7c1a20977334a507f3d3fac0108d82dbbba952a9b3ea840b500b9c |
i386 | |
ethereal-0.10.9-1.EL4.1.i386.rpm | SHA-256: 0fec11eedc4a2834e6f2c29e73ccbecc828ac103428ee6be0e9755a357ff1783 |
ethereal-gnome-0.10.9-1.EL4.1.i386.rpm | SHA-256: 95d6cc9873a76574757d445a8b8279778cd875a313e15b40b9307a567447353c |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
ethereal-0.10.9-1.EL4.1.src.rpm | SHA-256: 1618f41759ee8d9711d326eaaac2ee234283eb3dcf277963e6b64850ea7e7d56 |
x86_64 | |
ethereal-0.10.9-1.EL4.1.x86_64.rpm | SHA-256: 3a00e5fc2d3b81112eacb9b3d419a7bdba695fc69b7fbc61ecc10bdb14395fe0 |
ethereal-gnome-0.10.9-1.EL4.1.x86_64.rpm | SHA-256: 91a6d0b52b450d7a1959347241a6f375a6e055a8d8c4c6d36be7f1b278b3400a |
i386 | |
ethereal-0.10.9-1.EL4.1.i386.rpm | SHA-256: 0fec11eedc4a2834e6f2c29e73ccbecc828ac103428ee6be0e9755a357ff1783 |
ethereal-gnome-0.10.9-1.EL4.1.i386.rpm | SHA-256: 95d6cc9873a76574757d445a8b8279778cd875a313e15b40b9307a567447353c |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
ethereal-0.10.9-1.EL4.1.src.rpm | SHA-256: 1618f41759ee8d9711d326eaaac2ee234283eb3dcf277963e6b64850ea7e7d56 |
s390x | |
ethereal-0.10.9-1.EL4.1.s390x.rpm | SHA-256: 1ee12ff7f44d5f5c17504c5ea84d5b91bc19a9ed94b6a0dda409d0eff97a331c |
ethereal-gnome-0.10.9-1.EL4.1.s390x.rpm | SHA-256: 90e2d1dea09ce80f3f0bba71e410e01d9d5f28118ed8d33c55d15cfbd7c3ae8a |
s390 | |
ethereal-0.10.9-1.EL4.1.s390.rpm | SHA-256: cb30e69c1faa313853149d495e27a31bb611ae1966a14b240926bb2ad96656a0 |
ethereal-gnome-0.10.9-1.EL4.1.s390.rpm | SHA-256: 86a6466f0fb75a4873afff332e761b8f2bb2d9846a894c367be0a7d831f8daa9 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
ethereal-0.10.9-1.EL4.1.src.rpm | SHA-256: 1618f41759ee8d9711d326eaaac2ee234283eb3dcf277963e6b64850ea7e7d56 |
ppc | |
ethereal-0.10.9-1.EL4.1.ppc.rpm | SHA-256: f24546832a87b696b8a5c0069916b771be47cf657b1bb4681ee3acb160ef06b5 |
ethereal-gnome-0.10.9-1.EL4.1.ppc.rpm | SHA-256: c16c374b08855eb9b6eabdcc1d9db8f03110e6d40d6c48886ac68e1ddbf825e6 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.