Synopsis: Updated Ethereal packages fix security issues
Advisory ID: RHSA-2003:324-01
Issue date: 2003-11-12
Updated on: 2003-11-12
Product: Red Hat Enterprise Linux
Keywords: ethereal SOCKS buffer overflow
Cross references:
Obsoletes: RHSA-2003:077
CVE Names:
CAN-2003-0925 CAN-2003-0926 CAN-2003-0927
- ---------------------------------------------------------------------
1. Topic:
Updated Ethereal packages that fix a number of exploitable security issues
are now available.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, ppc64, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Problem description:
Ethereal is a program for monitoring network traffic.
A number of security issues affect Ethereal. By exploiting these issues,
it may be possible to make Ethereal crash or run arbitrary code by
injecting a purposefully-malformed packet onto the wire or by convincing
someone to read a malformed packet trace file.
A buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers
to cause a denial of service and possibly execute arbitrary code via a
malformed GTP MSISDN string. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name
CAN-2003-0925 to
this issue.
Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of
service (crash) via certain malformed ISAKMP or MEGACO packets. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0926 to this issue.
A heap-based buffer overflow in Ethereal 0.9.15 and earlier allows
remote attackers to cause a denial of service (crash) and possibly
execute arbitrary code via the SOCKS dissector. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0927
to this issue.
Users of Ethereal should update to these erratum packages containing
Ethereal version 0.9.16, which is not vulnerable to these issues.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
Please note that this update is available via Red Hat Network. To use Red
Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. Bug IDs fixed (
http://bugzilla.redhat.com/bugzilla for more info):
109189 -
CAN-2003-0925/6/7 Ethereal 0.9.13 has three exploitable security issues
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ethereal-0.9.16-0.AS21.1.src.rpm
i386:
Available from Red Hat Network: ethereal-0.9.16-0.AS21.1.i386.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.AS21.1.i386.rpm
ia64:
Available from Red Hat Network: ethereal-0.9.16-0.AS21.1.ia64.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.AS21.1.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ethereal-0.9.16-0.AS21.1.src.rpm
ia64:
Available from Red Hat Network: ethereal-0.9.16-0.AS21.1.ia64.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.AS21.1.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ethereal-0.9.16-0.AS21.1.src.rpm
i386:
Available from Red Hat Network: ethereal-0.9.16-0.AS21.1.i386.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.AS21.1.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ethereal-0.9.16-0.AS21.1.src.rpm
i386:
Available from Red Hat Network: ethereal-0.9.16-0.AS21.1.i386.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.AS21.1.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ethereal-0.9.16-0.30E.1.src.rpm
i386:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.i386.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.i386.rpm
ia64:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.ia64.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.ia64.rpm
ppc:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.ppc.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.ppc.rpm
ppc64:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.ppc64.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.ppc64.rpm
s390:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.s390.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.s390.rpm
s390x:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.s390x.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.s390x.rpm
x86_64:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.x86_64.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ethereal-0.9.16-0.30E.1.src.rpm
i386:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.i386.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.i386.rpm
ia64:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.ia64.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.ia64.rpm
x86_64:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.x86_64.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ethereal-0.9.16-0.30E.1.src.rpm
i386:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.i386.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.i386.rpm
ia64:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.ia64.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.ia64.rpm
x86_64:
Available from Red Hat Network: ethereal-0.9.16-0.30E.1.x86_64.rpm
Available from Red Hat Network: ethereal-gnome-0.9.16-0.30E.1.x86_64.rpm
7. Verification:
MD5 sum Package Name
- --------------------------------------------------------------------------
f2f751f79659db2b1f8e5000bbdc8e02 2.1AS/en/os/SRPMS/ethereal-0.9.16-0.AS21.1.src.rpm
1d3ac671ed6953cdbd40fcd13afb08c7 2.1AS/en/os/i386/ethereal-0.9.16-0.AS21.1.i386.rpm
17959904f950a620971f069480e7da62 2.1AS/en/os/i386/ethereal-gnome-0.9.16-0.AS21.1.i386.rpm
1bd71f1db645d232258865c9349f45c0 2.1AS/en/os/ia64/ethereal-0.9.16-0.AS21.1.ia64.rpm
9450cdf50235e8506c68c54001f99093 2.1AS/en/os/ia64/ethereal-gnome-0.9.16-0.AS21.1.ia64.rpm
f2f751f79659db2b1f8e5000bbdc8e02 2.1AW/en/os/SRPMS/ethereal-0.9.16-0.AS21.1.src.rpm
1bd71f1db645d232258865c9349f45c0 2.1AW/en/os/ia64/ethereal-0.9.16-0.AS21.1.ia64.rpm
9450cdf50235e8506c68c54001f99093 2.1AW/en/os/ia64/ethereal-gnome-0.9.16-0.AS21.1.ia64.rpm
f2f751f79659db2b1f8e5000bbdc8e02 2.1ES/en/os/SRPMS/ethereal-0.9.16-0.AS21.1.src.rpm
1d3ac671ed6953cdbd40fcd13afb08c7 2.1ES/en/os/i386/ethereal-0.9.16-0.AS21.1.i386.rpm
17959904f950a620971f069480e7da62 2.1ES/en/os/i386/ethereal-gnome-0.9.16-0.AS21.1.i386.rpm
f2f751f79659db2b1f8e5000bbdc8e02 2.1WS/en/os/SRPMS/ethereal-0.9.16-0.AS21.1.src.rpm
1d3ac671ed6953cdbd40fcd13afb08c7 2.1WS/en/os/i386/ethereal-0.9.16-0.AS21.1.i386.rpm
17959904f950a620971f069480e7da62 2.1WS/en/os/i386/ethereal-gnome-0.9.16-0.AS21.1.i386.rpm
7b43129577b889cc80342872874a75c6 3AS/en/os/SRPMS/ethereal-0.9.16-0.30E.1.src.rpm
f41c10849a3f596804998513196d81db 3AS/en/os/i386/ethereal-0.9.16-0.30E.1.i386.rpm
0c22584f44e987009458a4b8ff4d8a0e 3AS/en/os/i386/ethereal-gnome-0.9.16-0.30E.1.i386.rpm
0f0e977b2f51f465e3e2bc546de79502 3AS/en/os/ia64/ethereal-0.9.16-0.30E.1.ia64.rpm
9fd4385ebe09752b8f056b8f14425db3 3AS/en/os/ia64/ethereal-gnome-0.9.16-0.30E.1.ia64.rpm
889b69b459d0d75a25ff6ec252a88e34 3AS/en/os/ppc/ethereal-0.9.16-0.30E.1.ppc.rpm
f2a33bcfd6f3e04a1a5f896acfdbb4a1 3AS/en/os/ppc/ethereal-gnome-0.9.16-0.30E.1.ppc.rpm
d470fcf324773a16792165662cd3030a 3AS/en/os/ppc64/ethereal-0.9.16-0.30E.1.ppc64.rpm
ffcb0583704de5cd37598867abecc1bb 3AS/en/os/ppc64/ethereal-gnome-0.9.16-0.30E.1.ppc64.rpm
1911e2f37da9a65997fb1f328d8538ab 3AS/en/os/s390/ethereal-0.9.16-0.30E.1.s390.rpm
edec26578e242d59e4d520842f8c723d 3AS/en/os/s390/ethereal-gnome-0.9.16-0.30E.1.s390.rpm
95bd493a5c0c806c7e8cf7803c2820cb 3AS/en/os/s390x/ethereal-0.9.16-0.30E.1.s390x.rpm
187b5643674e225ac016c4ec77ac211e 3AS/en/os/s390x/ethereal-gnome-0.9.16-0.30E.1.s390x.rpm
e92c31e6f90657c11f8c585dd682310b 3AS/en/os/x86_64/ethereal-0.9.16-0.30E.1.x86_64.rpm
0bc604be57deef6750a0ac99be5e59be 3AS/en/os/x86_64/ethereal-gnome-0.9.16-0.30E.1.x86_64.rpm
7b43129577b889cc80342872874a75c6 3ES/en/os/SRPMS/ethereal-0.9.16-0.30E.1.src.rpm
f41c10849a3f596804998513196d81db 3ES/en/os/i386/ethereal-0.9.16-0.30E.1.i386.rpm
0c22584f44e987009458a4b8ff4d8a0e 3ES/en/os/i386/ethereal-gnome-0.9.16-0.30E.1.i386.rpm
0f0e977b2f51f465e3e2bc546de79502 3ES/en/os/ia64/ethereal-0.9.16-0.30E.1.ia64.rpm
9fd4385ebe09752b8f056b8f14425db3 3ES/en/os/ia64/ethereal-gnome-0.9.16-0.30E.1.ia64.rpm
e92c31e6f90657c11f8c585dd682310b 3ES/en/os/x86_64/ethereal-0.9.16-0.30E.1.x86_64.rpm
0bc604be57deef6750a0ac99be5e59be 3ES/en/os/x86_64/ethereal-gnome-0.9.16-0.30E.1.x86_64.rpm
7b43129577b889cc80342872874a75c6 3WS/en/os/SRPMS/ethereal-0.9.16-0.30E.1.src.rpm
f41c10849a3f596804998513196d81db 3WS/en/os/i386/ethereal-0.9.16-0.30E.1.i386.rpm
0c22584f44e987009458a4b8ff4d8a0e 3WS/en/os/i386/ethereal-gnome-0.9.16-0.30E.1.i386.rpm
0f0e977b2f51f465e3e2bc546de79502 3WS/en/os/ia64/ethereal-0.9.16-0.30E.1.ia64.rpm
9fd4385ebe09752b8f056b8f14425db3 3WS/en/os/ia64/ethereal-gnome-0.9.16-0.30E.1.ia64.rpm
e92c31e6f90657c11f8c585dd682310b 3WS/en/os/x86_64/ethereal-0.9.16-0.30E.1.x86_64.rpm
0bc604be57deef6750a0ac99be5e59be 3WS/en/os/x86_64/ethereal-gnome-0.9.16-0.30E.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key is
available from https://www.redhat.com/security/keys.html
You can verify each package with the following command:
rpm --checksig -v <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
md5sum <filename>
8. References:
http://www.ethereal.com/appnotes/enpa-sa-00011.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=
CAN-2003-0925
http://cve.mitre.org/cgi-bin/cvename.cgi?name=
CAN-2003-0926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=
CAN-2003-0927
9. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/solutions/security/news/contact.html
Copyright 2003 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE/skN7XlSAg2UNWIIRAo4UAJ44O+H8s0LWCWgDgTKUBwjvl35ORgCgoj1S
5x3wXsS7zkoVblTcm6qfTcQ=
=1xcN
-----END PGP SIGNATURE-----