[PLDSA 17-1] New ethereal packages fix multiple vulnerabilities

Krzysiek Taraszka dzimi at pld.org.pl
Thu Jan 30 14:11:23 CET 2003


- --------------------------------------------------------------------------
PLD Security Advisory PLDSA 17-1                        security at pld.org.pl
http://www.pld.org.pl/security/                          PLD Security Team
13 January 2003 			http://www.pld.org.pl/security/faq
- --------------------------------------------------------------------------

Package        : prior to ethereal-0.9.6-4		
Vulnerability  : multiple issues
Problem-Type   : local
PLD-specific   : no
Upstream URL   : www.ethereal.com/appnotes/enpa-sa-00007.html

It may be possible to make Ethereal crash or hang by injecting a purposefully malformed
packet onto the wire, or by convincing someone to read a malformed packet trace file. It
may be possible to make Ethereal run arbitrary code by exploiting the buffer and pointer
problems.

The above problems have been fixed in version 0.9.8-1 for the
current stable distribution (ra).

We recommend that you upgrade your ethereal packages.

wget -c url
	will fetch the file for you
rpm -Uhv file(s)*.rpm
        will upgrade the referenced file.

If you are using "poldek" - the package manager, use the line as given below
for upgrade packages

poldek --update
        will update the internal database
poldek --upgrade 'ethereal*'
        will install corrected packages

If you are using "apt" - the package manager, use the line as given below
for upgrade packages

apt-get update
        will update the internal database
apt-get upgrade 'ethereal*'
        will install corrected packages

PLD Linux 1.0 alias ra
- --------------------

  Source archives:

ftp://ftp.pld.org.pl/dists/ra/updates/security/SRPMS/ethereal-0.9.8-1.src.rpm
       MD5 checksum: 9a3541166a56fc1febedac79987d8cdd

ftp://ftp.pld.org.pl/dists/ra/updates/security/SRPMS/tethereal-0.9.8-1.src.rpm
       MD5 checksum: 6510047ad9bdba7f503c4428bb036811

  I386 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/ethereal-0.9.8-1.i386.rpm
       MD5 checksum: e8dafd122f4722d8917a15fb5de799b8

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/ethereal-common-0.9.8-1.i386.rpm
       MD5 checksum: bb010466f441a2b8bb87f8af030f7304

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/ethereal-tools-0.9.8-1.i386.rpm
       MD5 checksum: d64c3df6d62be1ab338ab6e2face28b7

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/tethereal-0.9.8-1.i386.rpm
       MD5 checksum: ec79d450a1746a769d0f31922692b827


  I586 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/ethereal-0.9.8-1.i586.rpm
       MD5 checksum: 0b0279933452f9eab7670d242aa12089

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/ethereal-common-0.9.8-1.i586.rpm
       MD5 checksum: dc43d49e2e4eb6b5ff72296829e37b75

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/ethereal-tools-0.9.8-1.i586.rpm
       MD5 checksum: 83efd793674a6740a69a4a026ab194e9

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/tethereal-0.9.8-1.i586.rpm
       MD5 checksum: 762df25f2539418825b660dda1b4dde6


  I686 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/ethereal-0.9.8-1.i686.rpm
       MD5 checksum: 01b6fc734b186fc76e100227c9ce35f1

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/ethereal-common-0.9.8-1.i686.rpm
       MD5 checksum: 3e60f100c82bfb14807417aa617744ce

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/ethereal-tools-0.9.8-1.i686.rpm
       MD5 checksum: 8d377ab897f9403526d5369d454bb26b

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/tethereal-0.9.8-1.i686.rpm
       MD5 checksum: ff5cb198405e5f0100bc29cc50089004


  PowerPC Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/ethereal-0.9.8-1.ppc.rpm
       MD5 checksum: e714fbcd4b4eb01a48eec0bef0ea9de9

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/ethereal-common-0.9.8-1.ppc.rpm
       MD5 checksum: e9aad146d4642cb8e331ef36bc4eac1e

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/ethereal-tools-0.9.8-1.ppc.rpm
       MD5 checksum: 21db82d2f94890110e8eb7113f412756

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/tethereal-0.9.8-1.ppc.rpm
       MD5 checksum: be16c8bd2994050555a590a53c45a3c9


-
--------------------------------------------------------------------------------
-
If you are using poldek add this line to poldek.conf.
If you are using apt-get add this line to sources.list.

For i386 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i386 base updates-security
For i586 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i586 base updates-security
For i686 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i686 base updates-security
For ppc architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/ppc base updates-security



More information about the pld-security-announce mailing list