[<prev] [next>] [day] [month] [year] [list]
Message-ID: <m1AdRDR-000pt9C__5323.93366233936$1073327484@finlandia.Infodrom.North.DE>
Date: Mon, 5 Jan 2004 10:40:05 +0100 (CET)
From: joey@...odrom.org (Martin Schulze)
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 407-1] New ethereal packages fix several vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 407-1 security@...ian.org
http://www.debian.org/security/ Martin Schulze
January 5th, 2004 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : ethereal
Vulnerability : buffer overflows
Problem-Type : remote
Debian-specific: no
CVE IDs : CAN-2003-0925 CAN-2003-0926 CAN-2003-0927 CAN-2003-1012 CAN-2003-1013
Several vulnerabilities were discovered upstream in ethereal, a
network traffic analyzer. The Common Vulnerabilities and Exposures
project identifies the following problems:
CAN-2003-0925
A buffer overflow allows remote attackers to cause a denial of
service and possibly execute arbitrary code via a malformed GTP
MSISDN string.
CAN-2003-0926
Via certain malformed ISAKMP or MEGACO packets remote attackers are
able to cause a denial of service (crash).
CAN-2003-0927
A heap-based buffer overflow allows remote attackers to cause a
denial of service (crash) and possibly execute arbitrary code via
the SOCKS dissector.
CAN-2003-1012
The SMB dissector allows remote attackers to cause a denial of
service via a malformed SMB packet that triggers a segmentation
fault during processing of selected packets.
CAN-2003-1013
The Q.931 dissector allows remote attackers to cause a denial of
service (crash) via a malformed Q.931, which triggers a null
dereference.
For the stable distribution (woody) this problem has been fixed in
version 0.9.4-1woody6.
For the unstable distribution (sid) this problem has been fixed in
version 0.10.0-1.
We recommend that you upgrade your ethereal and tethereal packages.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6.dsc
Size/MD5 checksum: 679 6c3d2beab693578b827bc0c2ecc13eb2
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6.diff.gz
Size/MD5 checksum: 37597 7456c1b4708a869295bb71480300370d
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4.orig.tar.gz
Size/MD5 checksum: 3278908 42e999daa659820ee93aaaa39ea1e9ea
Alpha architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 1940256 e8a45a24a24a145f2870d65b26fdda20
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 334238 0035322af1972fa6c1547e881b5b27fa
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 222006 da4e9538a37ac5dd740010b828afed8b
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 1706878 3c2e6c03f6383f3ae8d599a01853c344
ARM architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 1634664 f5f5d2aeba5fa26ac8d6b722f4d52b39
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 297294 267317a8d6f43f009673f3e9864e0308
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 205964 fe0528d0ee4b0922d1a449f9c12c0b81
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 1439166 390f1e6d9173454162195c47a10c6a0e
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 1512408 b9efde468cca1ddd6b731a3b343bd51d
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 286370 c618774e3718d11d94347b0d66f72af4
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 198298 a7c01d2560880e783e899cd623a27e7a
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 1325838 a7706f7f82b44a30d4a99b299c58b4ca
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 2150174 e2aba915304534ac4fbb060a2552d9c6
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 373042 f06169aeefd918e4e5b809393edb8dc2
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 233630 e7f788d020319a8147beb4172cdc736f
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 1860802 6c8ef685b4e61f34a0146eb6fc666fdb
HP Precision architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 1803668 213d7f4221de714ee5c4ef938d0bae54
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 322334 b6ebeeb39d2d57c0ed664f65389e55a2
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 216804 fd2e27b35aedd419a12db17bee96c596
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 1575270 f3ed65cc62fb1155e8e38a25320d0614
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 1424112 69cccce7cf5ead38369e6d508031d821
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 282604 e5c3264948cd2cad0c159893173f0748
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 195028 647f483dbf79dc47a95d48d105d6a7c4
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 1248072 8085433927ed54f1c1c8196d7c835709
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 1616398 9a41bb228b9b33894825d6cfd2bba741
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 305168 b4a94497386ab45e0494c7980def8e3e
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 213590 20a3ad3d4b5126890aa23179c1730f1a
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 1421550 ad0decba7ea5907e6a3149cacbc178f8
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 1596866 0321997c79a03298c65548bb5687e87d
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 304676 9a3fad3fe8394ae63f79d09580b41b39
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 213222 28bfeefdf54278545c2c132fe381dc12
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 1405698 182282caefb7aaf8025559894d7b9801
PowerPC architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 1617784 38000a653b7da7552904e66b8c736ecc
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 301846 70dede9038a6098642119765c87f6f80
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 208786 d69f6942493800fd491e90605d0be931
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 1418638 9394c10dff060a961329382c7a3433ad
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 1574214 a21cbd59b1d36e14da777da012768f21
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 300674 49a6af1c59fe07065267ebc5deecc8b8
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 203854 077f9492da7509958c890e598edadf14
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 1386518 d99962a50a8fafc9c509a67adb3399be
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 1582634 d0a792b3c2428ac28476799e888cef98
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 317982 936008ca75fecdec66519475f8466525
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 204626 2633099c059446cff5d41703718fb7bf
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 1388944 ede08f8bc62f1a5141a0bb2ed2ceea1d
These files will probably be moved into the stable distribution on
its next revision.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQE/+TD0W5ql+IAeqTIRAqbDAJ94AyY1dCtH0gsTSd+lPuuNsgsYnACdGQXl
ukugrDm00ja/05LtjROk2ys=
=4uYr
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists