lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <m1CgelK-000omwC__38643.6088862412$1103693085$gmane$org@finlandia.Infodrom.North.DE>
Date: Tue, 21 Dec 2004 08:48:54 +0100 (CET)
From: joey@...odrom.org (Martin Schulze)
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 613-1] New ethereal packages fix denial of service


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 613-1                     security@...ian.org
http://www.debian.org/security/                             Martin Schulze
December 21st, 2004                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : ethereal
Vulnerability  : infinite loop
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-1142

Brian Caswell discovered that an improperly formatted SMB packet could
make ethereal hang and eat CPU endlessly.

For the stable distribution (woody) this problem has been fixed in
version 0.9.4-1woody9.

For the unstable distribution (sid) this problem has been fixed in
version 0.10.8-1.

We recommend that you upgrade your ethereal packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9.dsc
      Size/MD5 checksum:      679 7c9fc119387a101d71755c93662928c1
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9.diff.gz
      Size/MD5 checksum:    40182 180ee910159fccf800116faea66351b5
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4.orig.tar.gz
      Size/MD5 checksum:  3278908 42e999daa659820ee93aaaa39ea1e9ea

  Alpha architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_alpha.deb
      Size/MD5 checksum:  1940992 b189e878ca4b14f76bf900063606a7b0
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_alpha.deb
      Size/MD5 checksum:   334414 9874a562be22514d55d6bb804356388e
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_alpha.deb
      Size/MD5 checksum:   222344 5776dfeda09c103939470d17146ba319
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_alpha.deb
      Size/MD5 checksum:  1707744 5c4e9f13ea8e9b88839c95e5c683ad64

  ARM architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_arm.deb
      Size/MD5 checksum:  1635506 1402ca58aef147adb7b68c529c8edfd9
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_arm.deb
      Size/MD5 checksum:   297648 7fdce14cf96d7dcec0bf2138a0d348bc
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_arm.deb
      Size/MD5 checksum:   206252 6a296cfcb0c4976b3e574c2397523ea6
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_arm.deb
      Size/MD5 checksum:  1439488 09d2b0ce610e967467205b2ed4d9483e

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_i386.deb
      Size/MD5 checksum:  1512774 e558c9641615ed6d354d62809b6e7868
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_i386.deb
      Size/MD5 checksum:   286664 dac97c8964dd8a224ea820da16a1cedc
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_i386.deb
      Size/MD5 checksum:   198484 372e09b54e12b9eddcb84307de96459b
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_i386.deb
      Size/MD5 checksum:  1326330 4ff43fc479633d40999cbc4e2a11bbae

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_ia64.deb
      Size/MD5 checksum:  2150402 34f57b395472c4a4fc4904dd4680ce77
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_ia64.deb
      Size/MD5 checksum:   373290 42e6b6bdeeefaf43626af576f24b036a
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_ia64.deb
      Size/MD5 checksum:   233910 f81908fa68c166bd23bbf6bb00eebae9
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_ia64.deb
      Size/MD5 checksum:  1861830 6d150a0551baffc42484d0bb31a0a299

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_hppa.deb
      Size/MD5 checksum:  1804730 ba392710dc9bcf400231310ca589fb0d
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_hppa.deb
      Size/MD5 checksum:   322632 4b45250011aa5b19c8d7dd808a91e77b
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_hppa.deb
      Size/MD5 checksum:   217082 f31d2680bbb79b1b5578e265ed10130a
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_hppa.deb
      Size/MD5 checksum:  1575894 cd8265875f022dbb9e5be10c52cf1ec0

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_m68k.deb
      Size/MD5 checksum:  1424750 e0795e69c7116b13edf1104a4f2441a0
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_m68k.deb
      Size/MD5 checksum:   282924 e54a4743b1606c4a8e79e20eefaf399f
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_m68k.deb
      Size/MD5 checksum:   195300 6d8c88341037a3dcf01e6ead2ed9ef47
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_m68k.deb
      Size/MD5 checksum:  1248924 3ad25c0e91a05847fd136902ad6bcef3

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_mips.deb
      Size/MD5 checksum:  1617096 4f5104b12b9c93803bfeb398dd33583c
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_mips.deb
      Size/MD5 checksum:   305428 ac322c962a941c95bd472e993162a172
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_mips.deb
      Size/MD5 checksum:   213860 13d0bbf8f7fc00abce3a171c88cee606
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_mips.deb
      Size/MD5 checksum:  1422094 f68867262f4503f85f4a6c7ccbe32360

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_mipsel.deb
      Size/MD5 checksum:  1598188 39314d770738fca475a3045a34643532
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_mipsel.deb
      Size/MD5 checksum:   304908 b1291df1d183711d9842708c29147187
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_mipsel.deb
      Size/MD5 checksum:   213514 136725ad81c8c754dee664a4e0a46584
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_mipsel.deb
      Size/MD5 checksum:  1406420 977d0952fcb3f9901fb302f5d7bb37a4

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_powerpc.deb
      Size/MD5 checksum:  1618546 bbd977299f1076fc24289d52592f7b87
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_powerpc.deb
      Size/MD5 checksum:   302114 981bfa8b3ad7e28dbdfa7c9a68484767
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_powerpc.deb
      Size/MD5 checksum:   209080 e0b3edebac1c822f2a1972a2020bbddd
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_powerpc.deb
      Size/MD5 checksum:  1419340 7bd6a1c1f4733451e878fe9c2d245ba2

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_s390.deb
      Size/MD5 checksum:  1574736 3a888ba7afb31343ccce8c4c0c57a58a
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_s390.deb
      Size/MD5 checksum:   300942 3e49c0c5c0e1ab8bda5efbe4888f826d
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_s390.deb
      Size/MD5 checksum:   204178 04760a79c990c84e9e134efbd93659d9
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_s390.deb
      Size/MD5 checksum:  1387436 5391d292ee32f628b491f4e7f337d937

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_sparc.deb
      Size/MD5 checksum:  1583332 7f4195f17884ab22d47b9ef9af31a94e
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_sparc.deb
      Size/MD5 checksum:   318224 3c2777424b4b317ca4fc19b931b1649e
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_sparc.deb
      Size/MD5 checksum:   204954 3353eefa66978c883a303a7d76ad052b
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_sparc.deb
      Size/MD5 checksum:  1389376 40b74f94dc36f0c4b4237547d2a1f469


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBx9VmW5ql+IAeqTIRAmp4AJ9zfchyZEwbMTf7U6J7VBr2YC/1CgCfbdId
esXRZbVxnqPjkKKpIS5PTFo=
=MlSt
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ