![]() |
|
ESB-2004.0807 -- Debian Security Advisory DSA 613-1 -- New ethereal packages fix denial of service |
|
Date: 22 December 2004 Original URL: http://www.auscert.org.au/render.html?cid=55&it=4649 References: ESB-2004.0806 Click here for PGP verifiable version -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2004.0807 -- Debian Security Advisory DSA 613-1
New ethereal packages fix denial of service
22 December 2004
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: ethereal
Publisher: Debian
Operating System: Debian GNU/Linux 3.0
Impact: Denial of Service
Access: Remote/Unauthenticated
CVE Names: CAN-2004-1142
Ref: ESB-2004.0806
Original Bulletin: http://www.debian.org/security/2004/dsa-613
Comment: As per ESB-2004.0806, the latest Ethereal 0.10.8 fixes
three other vulnerabilities besides this denial of service.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - --------------------------------------------------------------------------
Debian Security Advisory DSA 613-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
December 21st, 2004 http://www.debian.org/security/faq
- - --------------------------------------------------------------------------
Package : ethereal
Vulnerability : infinite loop
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-1142
Brian Caswell discovered that an improperly formatted SMB packet could
make ethereal hang and eat CPU endlessly.
For the stable distribution (woody) this problem has been fixed in
version 0.9.4-1woody9.
For the unstable distribution (sid) this problem has been fixed in
version 0.10.8-1.
We recommend that you upgrade your ethereal packages.
Upgrade Instructions
- - --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- - --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9.dsc
Size/MD5 checksum: 679 7c9fc119387a101d71755c93662928c1
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9.diff.gz
Size/MD5 checksum: 40182 180ee910159fccf800116faea66351b5
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4.orig.tar.gz
Size/MD5 checksum: 3278908 42e999daa659820ee93aaaa39ea1e9ea
Alpha architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_alpha.deb
Size/MD5 checksum: 1940992 b189e878ca4b14f76bf900063606a7b0
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_alpha.deb
Size/MD5 checksum: 334414 9874a562be22514d55d6bb804356388e
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_alpha.deb
Size/MD5 checksum: 222344 5776dfeda09c103939470d17146ba319
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_alpha.deb
Size/MD5 checksum: 1707744 5c4e9f13ea8e9b88839c95e5c683ad64
ARM architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_arm.deb
Size/MD5 checksum: 1635506 1402ca58aef147adb7b68c529c8edfd9
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_arm.deb
Size/MD5 checksum: 297648 7fdce14cf96d7dcec0bf2138a0d348bc
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_arm.deb
Size/MD5 checksum: 206252 6a296cfcb0c4976b3e574c2397523ea6
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_arm.deb
Size/MD5 checksum: 1439488 09d2b0ce610e967467205b2ed4d9483e
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_i386.deb
Size/MD5 checksum: 1512774 e558c9641615ed6d354d62809b6e7868
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_i386.deb
Size/MD5 checksum: 286664 dac97c8964dd8a224ea820da16a1cedc
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_i386.deb
Size/MD5 checksum: 198484 372e09b54e12b9eddcb84307de96459b
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_i386.deb
Size/MD5 checksum: 1326330 4ff43fc479633d40999cbc4e2a11bbae
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_ia64.deb
Size/MD5 checksum: 2150402 34f57b395472c4a4fc4904dd4680ce77
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_ia64.deb
Size/MD5 checksum: 373290 42e6b6bdeeefaf43626af576f24b036a
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_ia64.deb
Size/MD5 checksum: 233910 f81908fa68c166bd23bbf6bb00eebae9
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_ia64.deb
Size/MD5 checksum: 1861830 6d150a0551baffc42484d0bb31a0a299
HP Precision architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_hppa.deb
Size/MD5 checksum: 1804730 ba392710dc9bcf400231310ca589fb0d
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_hppa.deb
Size/MD5 checksum: 322632 4b45250011aa5b19c8d7dd808a91e77b
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_hppa.deb
Size/MD5 checksum: 217082 f31d2680bbb79b1b5578e265ed10130a
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_hppa.deb
Size/MD5 checksum: 1575894 cd8265875f022dbb9e5be10c52cf1ec0
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_m68k.deb
Size/MD5 checksum: 1424750 e0795e69c7116b13edf1104a4f2441a0
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_m68k.deb
Size/MD5 checksum: 282924 e54a4743b1606c4a8e79e20eefaf399f
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_m68k.deb
Size/MD5 checksum: 195300 6d8c88341037a3dcf01e6ead2ed9ef47
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_m68k.deb
Size/MD5 checksum: 1248924 3ad25c0e91a05847fd136902ad6bcef3
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_mips.deb
Size/MD5 checksum: 1617096 4f5104b12b9c93803bfeb398dd33583c
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_mips.deb
Size/MD5 checksum: 305428 ac322c962a941c95bd472e993162a172
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_mips.deb
Size/MD5 checksum: 213860 13d0bbf8f7fc00abce3a171c88cee606
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_mips.deb
Size/MD5 checksum: 1422094 f68867262f4503f85f4a6c7ccbe32360
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_mipsel.deb
Size/MD5 checksum: 1598188 39314d770738fca475a3045a34643532
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_mipsel.deb
Size/MD5 checksum: 304908 b1291df1d183711d9842708c29147187
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_mipsel.deb
Size/MD5 checksum: 213514 136725ad81c8c754dee664a4e0a46584
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_mipsel.deb
Size/MD5 checksum: 1406420 977d0952fcb3f9901fb302f5d7bb37a4
PowerPC architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_powerpc.deb
Size/MD5 checksum: 1618546 bbd977299f1076fc24289d52592f7b87
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_powerpc.deb
Size/MD5 checksum: 302114 981bfa8b3ad7e28dbdfa7c9a68484767
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_powerpc.deb
Size/MD5 checksum: 209080 e0b3edebac1c822f2a1972a2020bbddd
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_powerpc.deb
Size/MD5 checksum: 1419340 7bd6a1c1f4733451e878fe9c2d245ba2
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_s390.deb
Size/MD5 checksum: 1574736 3a888ba7afb31343ccce8c4c0c57a58a
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_s390.deb
Size/MD5 checksum: 300942 3e49c0c5c0e1ab8bda5efbe4888f826d
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_s390.deb
Size/MD5 checksum: 204178 04760a79c990c84e9e134efbd93659d9
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_s390.deb
Size/MD5 checksum: 1387436 5391d292ee32f628b491f4e7f337d937
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody9_sparc.deb
Size/MD5 checksum: 1583332 7f4195f17884ab22d47b9ef9af31a94e
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody9_sparc.deb
Size/MD5 checksum: 318224 3c2777424b4b317ca4fc19b931b1649e
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody9_sparc.deb
Size/MD5 checksum: 204954 3353eefa66978c883a303a7d76ad052b
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody9_sparc.deb
Size/MD5 checksum: 1389376 40b74f94dc36f0c4b4237547d2a1f469
These files will probably be moved into the stable distribution on
its next update.
- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFBx9VmW5ql+IAeqTIRAmp4AJ9zfchyZEwbMTf7U6J7VBr2YC/1CgCfbdId
esXRZbVxnqPjkKKpIS5PTFo=
=MlSt
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBQci3rSh9+71yA2DNAQLbowQAk/mJRekszwe2Y0tnk/HBzTonAg2ZKmIe
WU7dzp3bhCOfHNTCYpkn7PHHZ8u2qeywcbbDnb0cN3iW01GCGOeTbsquuxusoAeG
LA65AZsaxhjRWIBTijuiawiF/LMd3f02hUAFHRvSlPemrrc+uM4NcS4/HepDTZVl
S1f4du27QIQ=
=Q3BF
-----END PGP SIGNATURE-----
|