74232 2002-08-30 18:03 /50 rader/ Daniel Ahlberg <aliz@gentoo.org> Importerad: 2002-08-30 18:03 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <1328> Ärende: GLSA: ethereal ------------------------------------------------------------ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT - - -------------------------------------------------------------------- PACKAGE :ethereal SUMMARY :buffer overflow DATE :2002-08-30 07:30 UTC - - -------------------------------------------------------------------- OVERVIEW The ISIS protocol dissector in Ethereal 0.9.5 and earlier versions is susceptible to a buffer overflow. DETAIL It may be possible to make Ethereal crash or hang by injecting a purposefully malformed packet onto the wire, or by convincing someone to read a malformed packet trace file. It may be possible to make Ethereal run arbitrary code by exploiting the buffer and pointer problems. The full advisory can be read at http://www.ethereal.com/appnotes/enpa-sa-00006.html SOLUTION It is recommended that all Gentoo Linux users who are running net-analyzer/ethereal-0.9.5-r2 and earlier update their systems as follows: emerge rsync emerge ethereal emerge clean - - -------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE9bytUfT7nyhUpoZMRAms+AKCUt6lH8p4gYd+1D92rf3mod3YpuwCeJRSa l4axUEqXgrW1U46/R5V8SN8= =N0in -----END PGP SIGNATURE----- (74232) /Daniel Ahlberg <aliz@gentoo.org>/(Ombruten) 74250 2002-08-30 22:08 /54 rader/ Jonas Eriksson <je@sekure.net> Importerad: 2002-08-30 22:08 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <1334> Ärende: Potential issue with Ethereal ------------------------------------------------------------ From the ethereal page, http://www.ethereal.com/appnotes/enpa-sa-00006.html SUMMARY Name: Potential issue with Ethereal 0.9.5 Docid: enpa-sa-00006 Date: August 20, 2002 Severity: High DETAILS Description: The ISIS protocol dissector in Ethereal 0.9.5 and earlier versions is susceptible to a buffer overflow. In order to determine which version of Ethereal you have installed, do one of the following: Load Ethereal and go to the Help->About Ethereal... menu item. From the command line run ethereal -vor tethereal -v(the "v" is lowercase"). Either action will display the the application version along with the libraries that Ethereal and Tethereal are linked with. If version "0.9.5" or prior is displayed, the application is susceptible. Impact: It may be possible to make Ethereal crash or hang by injecting a purposefully malformed packet onto the wire, or by convincing someone to read a malformed packet trace file. It may be possible to make Ethereal run arbitrary code by exploiting the buffer and pointer problems. Resolution: Upgrade to 0.9.6. If you are running a version prior to 0.9.6, you can disable the ISIS protocol dissector by selecting Edit->Protocols... and deselecting "isis" from the list. Regards, Jonas Eriksson (74250) /Jonas Eriksson <je@sekure.net>/--(Ombruten)