From security@mandriva.com Wed Jan 4 00:53:09 2006 From: Mandriva Security Team To: full-disclosure@lists.grok.org.uk Date: Tue, 03 Jan 2006 22:53:00 -0700 Subject: [Full-disclosure] MDKSA-2006:002 - Updated ethereal packages fix vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2006:002 http://www.mandriva.com/security/ _______________________________________________________________________ Package : ethereal Date : January 3, 2006 Affected: 2006.0 _______________________________________________________________________ Problem Description: Three vulnerabilities were discovered in Ethereal 0.10.13: The IRC and GTP dissectors could go into an infinite loop. A buffer overflow was discovered by iDefense in the OSPF dissector. Ethereal has been upgraded to 0.10.14 which does not suffer from these problems. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3651 http://www.ethereal.com/appnotes/enpa-sa-00022.html _______________________________________________________________________ Updated Packages: Mandriva Linux 2006.0: a055efb80c48c277b052ad733a7f8dc9 2006.0/RPMS/ethereal-0.10.14-0.1.20060mdk.i586.rpm acf8e4fc1f1c2d75002c8583474d4f01 2006.0/RPMS/ethereal-tools-0.10.14-0.1.20060mdk.i586.rpm 499b8112338d62b7b2db6ad3f0869109 2006.0/RPMS/libethereal0-0.10.14-0.1.20060mdk.i586.rpm 528f458848c122e2fd42fb3116643fea 2006.0/RPMS/tethereal-0.10.14-0.1.20060mdk.i586.rpm 44c4e7789d3e6b33ec5c4cf077557fc1 2006.0/SRPMS/ethereal-0.10.14-0.1.20060mdk.src.rpm Mandriva Linux 2006.0/X86_64: 1a99f01c91cbf6dde19f41d1e3dd27eb x86_64/2006.0/RPMS/ethereal-0.10.14-0.1.20060mdk.x86_64.rpm f628d006ff03fbd21deb47b0387a3388 x86_64/2006.0/RPMS/ethereal-tools-0.10.14-0.1.20060mdk.x86_64.rpm 56cf815f56a5baa86820ed1d9e844066 x86_64/2006.0/RPMS/lib64ethereal0-0.10.14-0.1.20060mdk.x86_64.rpm 1528803d727413623fd5b3f40414f7e1 x86_64/2006.0/RPMS/tethereal-0.10.14-0.1.20060mdk.x86_64.rpm 44c4e7789d3e6b33ec5c4cf077557fc1 x86_64/2006.0/SRPMS/ethereal-0.10.14-0.1.20060mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFDuzhzmqjQ0CJFipgRAsK5AJ9i9DwYIEp47VGYK3PkxP5Brcnp3wCfSgL4 bKz0hFtRmtBUFCtXrR8LmHY= =Lpd+ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/