SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Wireshark Vendors:   Wireshark.org
(Red Hat Issues Fix for RHEL) Ethereal Bugs in the iSNS, SMB, and SNMP Dissectors Let Remote Users Crash Ethereal or Possibly Execute Arbitrary Code
SecurityTracker Alert ID:  1010883
SecurityTracker URL:  http://securitytracker.com/id/1010883
CVE Reference:   CVE-2004-0633, CVE-2004-0634, CVE-2004-0635   (Links to External Site)
Date:  Aug 6 2004
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 0.8.15 up to and including 0.10.4
Description:   Several vulnerabilities were was reported in Ethereal in the iSNS, SMB, and SNMP dissectors. A remote user can cause the Ethereal process to crash and may be able to execute arbitrary code on the target system.

The vendor reported that a remote user can send a specially crafted packet to the target system or via a network that is monitored by the target system to trigger one of several flaws. A remote user can also create a specially crafted trace file that, when played by the target user, will have the same effect.

A remote user can cause the iSNS dissector to cause Ethereal to abort in some cases (affecting versions 0.10.3 - 0.10.4), the report said [CVE: CVE-2004-0633].

It is also reported that the Ethereal process performing SMB SID snooping may crash if there is no policy name for a handle (affecting versions 0.9.15 - 0.10.4) [CVE: CVE-2004-0634].

It is also reported that a remote user can send an SNMP packet with a specially crafted or missing community string to cause the process to crash (affecting versions 0.8.15 - 0.10.4) [CVE: CVE-2004-0635].

Impact:   A remote user can cause the Ethereal process to crash.

A remote user may be able to execute arbitrary code on the target system with the privileges of the Ethereal process.

Solution:   Red Hat has released a fix.

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

ia64:
67c86c33f2f5052b695fb5308eb9ef37 ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600 ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm

ia64:
67c86c33f2f5052b695fb5308eb9ef37 ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600 ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06 ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5 ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7 ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

ppc:
337260b85f120ac6c5c86e016c72f883 ethereal-0.10.5-0.30E.2.ppc.rpm
c320f1e59876983c783ee89190dbfa34 ethereal-gnome-0.10.5-0.30E.2.ppc.rpm

s390:
de6dcfb5cc97d4f60b76a8c5f785b5cd ethereal-0.10.5-0.30E.2.s390.rpm
cb2b66afaeac23cea5570e3d63639e67 ethereal-gnome-0.10.5-0.30E.2.s390.rpm

s390x:
3a58d3ce6c36a8ed26acaf7d87ae99a3 ethereal-0.10.5-0.30E.2.s390x.rpm
5996b8a24b8a1fe531902caa66512a3f ethereal-gnome-0.10.5-0.30E.2.s390x.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29 ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3 ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

Vendor URL:  www.ethereal.com/appnotes/enpa-sa-00015.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  2.1, 3

Message History:   This archive entry is a follow-up to the message listed below.
Jul 7 2004 Ethereal Bugs in the iSNS, SMB, and SNMP Dissectors Let Remote Users Crash Ethereal or Possibly Execute Arbitrary Code



 Source Message Contents

Subject:  [RHSA-2004:378-01] Updated Ethereal packages fix security issues


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated Ethereal packages fix security issues
Advisory ID:       RHSA-2004:378-01
Issue date:        2004-08-05
Updated on:        2004-08-05
Product:           Red Hat Enterprise Linux
Obsoletes:         RHSA-2004:234
CVE Names:         CAN-2004-0633 CAN-2004-0634 CAN-2004-0635
- ---------------------------------------------------------------------

1. Summary:

Updated Ethereal packages that fix various security vulnerabilities are now
available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Ethereal is a program for monitoring network traffic.

The SNMP dissector in Ethereal releases 0.8.15 through 0.10.4 contained a
memory read flaw.  On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash or
possibly execute arbitrary code.  The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-0635 to this issue.

The SMB dissector in Ethereal releases 0.9.15 through 0.10.4 contained a
null  pointer flaw.  On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0634 to this issue.

The iSNS dissector in Ethereal releases 0.10.3 through 0.10.4 contained an
integer overflow flaw.  On a system where Ethereal is running, a remote
attacker could send malicious packets that could cause Ethereal to crash or
possibly execute arbitrary code.  The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-0633 to this issue.

Users of Ethereal should upgrade to these updated packages, which contain
a version that is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/


5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

127381 - CAN-2004-0633/34/35 Multiple problems in Ethereal 0.10.4

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06  ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5  ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7  ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

ia64:
67c86c33f2f5052b695fb5308eb9ef37  ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600  ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06  ethereal-0.10.5-0.AS21.2.src.rpm

ia64:
67c86c33f2f5052b695fb5308eb9ef37  ethereal-0.10.5-0.AS21.2.ia64.rpm
2b75b683911859104439b62c18465600  ethereal-gnome-0.10.5-0.AS21.2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06  ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5  ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7  ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ethereal-0.10.5-0.AS21.2.src.rpm
60215293034749ae22e909ed60eaee06  ethereal-0.10.5-0.AS21.2.src.rpm

i386:
25857a9921162aa88bfc920e94fb20e5  ethereal-0.10.5-0.AS21.2.i386.rpm
3c9f8e3c28a714cefd97b8ef350269e7  ethereal-gnome-0.10.5-0.AS21.2.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b  ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d  ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c  ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d  ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29  ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

ppc:
337260b85f120ac6c5c86e016c72f883  ethereal-0.10.5-0.30E.2.ppc.rpm
c320f1e59876983c783ee89190dbfa34  ethereal-gnome-0.10.5-0.30E.2.ppc.rpm

s390:
de6dcfb5cc97d4f60b76a8c5f785b5cd  ethereal-0.10.5-0.30E.2.s390.rpm
cb2b66afaeac23cea5570e3d63639e67  ethereal-gnome-0.10.5-0.30E.2.s390.rpm

s390x:
3a58d3ce6c36a8ed26acaf7d87ae99a3  ethereal-0.10.5-0.30E.2.s390x.rpm
5996b8a24b8a1fe531902caa66512a3f  ethereal-gnome-0.10.5-0.30E.2.s390x.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3  ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e  ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b  ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d  ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c  ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d  ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29  ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3  ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e  ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ethereal-0.10.5-0.30E.2.src.rpm
5104f1cd2dea35fd3fdf79337a76783b  ethereal-0.10.5-0.30E.2.src.rpm

i386:
16e8b243835adf2d389847b83012476d  ethereal-0.10.5-0.30E.2.i386.rpm
c994b6a92771d734260c850e530b638c  ethereal-gnome-0.10.5-0.30E.2.i386.rpm

ia64:
ec1027f7961c9109a7f29888805b6b4d  ethereal-0.10.5-0.30E.2.ia64.rpm
2e66c5f80398fdda9ad4d1dbc44bcb29  ethereal-gnome-0.10.5-0.30E.2.ia64.rpm

x86_64:
0167f986d80088b4118b563fe06a62b3  ethereal-0.10.5-0.30E.2.x86_64.rpm
98448ea99dc58ab55072961508c7305e  ethereal-gnome-0.10.5-0.30E.2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package

7. References:

http://www.ethereal.com/appnotes/enpa-sa-00015.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0633
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0635

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBEmKsXlSAg2UNWIIRAvoMAKCs2vJUbX+cWSM94cJdpbryiw3LDgCgstOG
9jnGk4Fcu0pz7dhR9k2U1AQ=
=XUSM
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC