Yellow Dog Linux Security Advisory: YDU-20030113-2
yellowdog-updates@lists.terrasoftsolutions.com
yellowdog-updates@lists.terrasoftsolutions.com
Mon, 13 Jan 2003 13:26:14 -0700 (MST)
Yellow Dog Linux Security Announcement
--------------------------------------
Package: ethereal
Issue Date: January 13, 2002
Priority: medium
Advisory ID: YDU-20030113-2
1. Topic:
Updated ethereal packages are available.
2. Problem:
"Ethereal is a package designed for monitoring network traffic on your
system. Several security issues have been found in the Ethereal packages
distributed with [Yellow Dog Linux 2.3].
Multiple integer signedness errors in the BGP dissector in Ethereal
0.9.7 and earlier allow remote attackers to cause a denial of service
(infinite loop) via malformed messages. This problem was discovered by
Silvio Cesare. CAN-2002-1355
Ethereal 0.9.7 and earlier allows remote attackers to cause a denial
of service (crash) and possibly execute arbitrary code via malformed
packets to the LMP, PPP, or TDS dissectors. CAN-2002-1356
Users of Ethereal should update to the erratum packages containing Ethereal
version 0.9.8 which is not vulnerable to these issues."
(from Red Hat Advisory)
3. Solution:
a) Updating via apt...
We suggest that you use the apt-get program to keep your
system up-to-date. The following command(s) will retrieve
and install the fixed version of this update onto your system:
apt-get update
apt-get install ethereal
b) Updating manually...
Download the updates below and then run the following rpm command.
(Please use a mirror site)
rpm -Fvh [filenames]
ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.3/
ppc/ethereal-0.9.8-0.73.0a.ppc.rpm
ppc/ethereal-gnome-0.9.8-0.73.0a.ppc.rpm
4. Verification
MD5 checksum Package
-------------------------------- ----------------------------
f600a92dda60c49c53e6595104449c48 ppc/ethereal-0.9.8-0.73.0a.ppc.rpm
3d24b862d009fdea61aa29fe5ccfe450 ppc/ethereal-gnome-0.9.8-0.73.0a.ppc.rpm
acd5e048de0c8c09c5a3d15155304d7b SRPMS/ethereal-0.9.8-0.73.0a.src.rpm
I wish to verify that each package has not been corrupted or tampered with,
examine the md5sum with the following command: rpm --checksig --nogpg filename
5. Misc.
Terra Soft has setup a moderated mailing list where these security, bugfix, and package
enhancement announcements will be posted. See http://lists.terrasoftsolutions.com/ for more
information.
For information regarding the usage of apt-get, see:
http://www.yellowdoglinux.com/support/solutions/ydl_general/apt-get.shtml