English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 126339 CVE Beschreibungen
und 74190 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 324-1                     security@debian.org
http://www.debian.org/security/                             Matt Zimmerman
June 18th, 2003                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : ethereal
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE Ids        : CAN-2003-0428 CAN-2003-0429 CAN-2003-0431 CAN-2003-0432

Several of the packet dissectors in ethereal contain string handling
bugs which could be exploited using a maliciously crafted packet to
cause ethereal to consume excessive amounts of memory, crash, or
execute arbitrary code.

These vulnerabilites were announced in the following Ethereal security
advisory:

http://www.ethereal.com/appnotes/enpa-sa-00010.html

Ethereal 0.9.4 in Debian 3.0 (woody) is affected by most of the
problems described in the advisory, including:

    * The DCERPC dissector could try to allocate too much memory
      while trying to decode an NDR string.
    * Bad IPv4 or IPv6 prefix lengths could cause an overflow in the
      OSI dissector.
    * The tvb_get_nstringz0() routine incorrectly handled a
      zero-length buffer size.
    * The BGP, WTP, DNS, 802.11, ISAKMP, WSP, CLNP, and ISIS
      dissectors handled strings improperly. 

The following problems do NOT affect this version:

    * The SPNEGO dissector could segfault while parsing an invalid
      ASN.1 value.
    * The RMI dissector handled strings improperly

as these modules are not present.

For the stable distribution (woody) these problems have been fixed in
version 0.9.4-1woody5.

The old stable distribution (potato) these problems will be fixed in a
future advisory.

For the unstable distribution (sid) these problems are fixed in
version 0.9.13-1.

We recommend that you update your ethereal package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5.dsc
      Size/MD5 checksum:      679 fb98a4629ed5c2a09188264978e235cb
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5.diff.gz
      Size/MD5 checksum:    36263 4db84b40ff262dc4fa536bcbb215eb2b
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4.orig.tar.gz
      Size/MD5 checksum:  3278908 42e999daa659820ee93aaaa39ea1e9ea

  Alpha architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_alpha.deb
      Size/MD5 checksum:  1938816 8e4a1ce81eb9f19d45c01e590d9a377e
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_alpha.deb
      Size/MD5 checksum:   334136 08bf42a6d7dbb50692d708d7a9197d87
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_alpha.deb
      Size/MD5 checksum:   221920 ee4403d6c0b7c07c83eec534988a84ee
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_alpha.deb
      Size/MD5 checksum:  1705816 7ee849802d94d148a14119f76992b2f0

  ARM architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_arm.deb
      Size/MD5 checksum:  1633896 0abfa9d3c0eb5db8321a6762ab9dfa7b
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_arm.deb
      Size/MD5 checksum:   297150 bfbad9f07fab5ab34a6eab1ef8e5953d
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_arm.deb
      Size/MD5 checksum:   205828 ea7d760224ab01952527eacbc4587d20
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_arm.deb
      Size/MD5 checksum:  1438470 4f1f6d0135cbfc0044c688c39a956bea

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_i386.deb
      Size/MD5 checksum:  1511912 5c1107c1016a8025e5b1d56eeccf84df
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_i386.deb
      Size/MD5 checksum:   286266 9c979f57424b5d55c5de6621098e96d2
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_i386.deb
      Size/MD5 checksum:   198218 c49c94d9dc7312668c9b48a550df6a1c
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_i386.deb
      Size/MD5 checksum:  1324568 9aeb2ffbc5277b3196b83e6d38b53621

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_ia64.deb
      Size/MD5 checksum:  2149036 c68b86189746723e62bf08368bce227b
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_ia64.deb
      Size/MD5 checksum:   372962 9247b82b07d2eb11446fdce5f88983dc
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_ia64.deb
      Size/MD5 checksum:   233512 c030461e088a87758a4ba9935f0733e1
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_ia64.deb
      Size/MD5 checksum:  1859410 ab7f2190f094c3b8e67d56ff49045b9a

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_hppa.deb
      Size/MD5 checksum:  1802910 eb690bcb02ebf1c750205177cb248f72
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_hppa.deb
      Size/MD5 checksum:   322214 5ee2178f9c733121c7a1f0d524627880
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_hppa.deb
      Size/MD5 checksum:   216700 fa66e8a08983e09421560bd10f3c3965
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_hppa.deb
      Size/MD5 checksum:  1574692 b336a02e18c9f495960a9d0dec3d8e45

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_m68k.deb
      Size/MD5 checksum:  1423170 d59023d4c5cdf8dde7d3bfe8cc33d587
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_m68k.deb
      Size/MD5 checksum:   282466 6c85c7db7c36488746ef3f1e4a18d186
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_m68k.deb
      Size/MD5 checksum:   194916 d33873842e7080c48de9e9c337c76c79
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_m68k.deb
      Size/MD5 checksum:  1247402 58295f85485a65b3f65e2f4af5ef5961

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_mips.deb
      Size/MD5 checksum:  1616264 7d0870d9b8b38f03a0a380996dfa33f9
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_mips.deb
      Size/MD5 checksum:   305088 295015eb873bfb754e75c1396e752243
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_mips.deb
      Size/MD5 checksum:   213484 8d0afae76790f5fdbebfd785bd3e0eb5
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_mips.deb
      Size/MD5 checksum:  1421086 ecfbd6ffa565b529da0e654f344a1d55

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_mipsel.deb
      Size/MD5 checksum:  1596546 b84b95c09877df3556a688045c99c260
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_mipsel.deb
      Size/MD5 checksum:   304588 762bfcd3d71a6baec47e2e1faec0ef4c
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_mipsel.deb
      Size/MD5 checksum:   213108 666e6babaccfceda951053a9e03d5e77
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_mipsel.deb
      Size/MD5 checksum:  1405282 93b65858bfce3a879a05de921f2b0adc

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_powerpc.deb
      Size/MD5 checksum:  1616884 20f757b5b8bbdd9c604741f0a4e6f844
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_powerpc.deb
      Size/MD5 checksum:   301724 96ce6842b578c13330879589a1692d47
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_powerpc.deb
      Size/MD5 checksum:   208664 de9e536ef2560206395d9ede28c4aeef
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_powerpc.deb
      Size/MD5 checksum:  1418060 f28e69f82efff9434c37ac70f9f6af86

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_s390.deb
      Size/MD5 checksum:  1573598 a93240eca8bb226a0ad8bcabc6a6c5a3
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_s390.deb
      Size/MD5 checksum:   300554 a239b466decac0566be563242665d1aa
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_s390.deb
      Size/MD5 checksum:   203712 94f12ad0a3961df640587313f2b20b6a
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_s390.deb
      Size/MD5 checksum:  1386068 6401707646ae88c8220e5c6143a9c40b

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody5_sparc.deb
      Size/MD5 checksum:  1581564 c60e1b864726561eea77d65c6c3d4da3
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody5_sparc.deb
      Size/MD5 checksum:   317866 16956acf9b44bf36174733cd620348d3
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody5_sparc.deb
      Size/MD5 checksum:   204488 a5bccb53d6e679c552cb0093936c0e69
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody5_sparc.deb
      Size/MD5 checksum:  1388806 429a6f0c8c4ff5443dbabd94610998aa

These files will probably be moved into the stable distribution on its
next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE+7+WgArxCt0PiXR4RApkaAJoCsrPE4mkvcm+XN8vAGLkpuJ2USwCghY7p
Bav/5pgLLDta0TotoscgwJk=
=IzRs
-----END PGP SIGNATURE-----

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Developer APIs | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde

© 1998-2019 E-Soft Inc. Alle Rechte vorbehalten.