[RedHat] Schwachstellen in Ethereal - RHSA-2003:203-01

win-sec-ssc at cert.dfn.de win-sec-ssc at cert.dfn.de
Fre Jul 4 10:13:18 CEST 2003


-----BEGIN PGP SIGNED MESSAGE-----

Liebe Kolleginnen und Kollegen,

soeben erreichte uns nachfolgendes RedHat Security Advisory ueber
Sicherheitsprobleme bei Ethereal. Wir geben diese Informationen
unveraendert an Sie weiter.

Die Schwachstellen in Ethereal sind bereits in verschiedenen Linux
Advisories beschrieben worden:

CAN-2003-0356 - Off by One Buffer Overflows:

  In einigen Modulen besteht die Moeglichkeit einen Buffer um ein
  Byte weiter zu beschreiben als vorgesehen. Diese speziellen Buffer
  Overflows lassen sich von einem entfernten Angreifer ueber das
  Netzwerk ausnutzen, um ethereal zum Absturz zu bringen (Denial of
  Service) und evtl. um beliebigen Code auf dem verwundbaren System
  auszufuehren. Betroffen sind die Module zur Analyse der Protokolle
  AIM, GIOP Gryphon, OSPF, PPTP, Quake, Quake2, Quake3, Rsync, SMB,
  SMPP und TSP.

CAN-2003-0357 - Integer Overflows:

  In den Modulen zur Analyse der Protokolle Mount und PPP besteht die
  Moeglichkeit Integer Overflows auszuloesen. Ein entfernter Angreifer
  kann dadurch ueber das Netzwerk ethereal zum Absturz bringen und
  evtl. beliebigen Code zur Ausfuehrung bringen.

CVE Ids: CAN-2003-0428 CAN-2003-0429 CAN-2003-0431 CAN-2003-0432

 - es existiert eine Schwachstelle im DCERPC Dissector, durch die bei
 der Dekodierung von NDR Zeichenketten zu viel Speicher alloziert wird.

 - im OSI Dissector kann durch fehlerhafte IPv4 or IPv6
 Prefix-Laengenangaben ein Buffer Overflow ausgeloest werden.

 - die tvb_get_nstringz0() Funktion behandelt einen 0-Byte-Buffer
 unzureichend.

 - die BGP, WTP, DNS, 802.11, ISAKMP, WSP, CLNP und ISIS Dissektoren
 behandeln Zeichenketten unsicher.

Weitere Informationen zu diesen Schwachstellen finden Sie unter der URL

  http://www.ethereal.com/appnotes/enpa-sa-00010.html

Von Red Hat ist betroffen:

    Red Hat Linux 7.2 - i386, ia64
    Red Hat Linux 7.3 - i386
    Red Hat Linux 8.0 - i386
    Red Hat Linux 9 - i386

Es werden ueberarbeitete Pakete zur Verfuegung gestellt (version
0.9.13).

(c) der deutschen Zusammenfassung bei DFN-CERT GmbH; die Verbreitung,
auch auszugsweise, ist nur unter Hinweis auf den Urheber, DFN-CERT GmbH,
und nur zu nicht kommerziellen Zwecken gestattet.

Mit freundlichen Gruessen,

    Jan Kohlrausch
- -- 
Jan Kohlrausch     |             mailto:kohlrausch at cert.dfn.de
DFN-CERT GmbH      |   http://www.cert.dfn.de/team/kohlrausch/
Heidenkanpsweg 41  |                 Phone: +49(40) 808077 555
D-20097 Hamburg    |                   FAX: +49(40) 808077 556
Germany	           |                     PGP-KeyID: 0xA5DD03D1
PGP-Key Fingerprint:  A255 1C51 0A30 3E78  5B40 DAB7 14F7 C9E8


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated Ethereal packages fix security issues
Advisory ID:       RHSA-2003:203-01
Issue date:        2003-07-03
Updated on:        2003-07-03
Product:           Red Hat Linux
Keywords:          ethereal SOCKS buffer overflow
Cross references:  
Obsoletes:         RHSA-2003:076
CVE Names:         CAN-2003-0356 CAN-2003-0357 CAN-2003-0428 CAN-2003-0429 CAN-2003-0430 CAN-2003-0431 CAN-2003-0432
- - ---------------------------------------------------------------------

1. Topic:

Updated Ethereal packages available to fix a number of remotely
exploitable security issues

2. Relevant releases/architectures:

Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
Red Hat Linux 9 - i386

3. Problem description:

Ethereal is a program for monitoring network traffic.

A number of security issues affect Ethereal.  By exploiting these issues it
may be possible to make Ethereal crash or run arbitrary code by injecting a
purposefully malformed packet onto the wire or by convincing someone to
read a malformed packet trace file.

Multiple off-by-one vulnerabilities exist in Ethereal 0.9.11 and earlier in
the AIM, GIOP Gryphon, OSPF, PPTP, Quake, Quake2, Quake3, Rsync, SMB, SMPP,
and TSP dissectors. They do not properly use the tvb_get_nstringz and
tvb_get_nstringz0 functions.   Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0356 to these issues.

Multiple integer overflow vulnerabilities exist in Ethereal 0.9.11 and
earlier in the Mount and PPP dissectors.  (CAN-2003-0357)

A vulnerability in the DCERPC dissector exists in Ethereal 0.9.12 and
earlier, allowing remote attackers to cause a denial of service (memory
consumption) via a certain NDR string.  (CAN-2003-0428)

The OSI dissector in Ethereal 0.9.12 and earlier causes by invalid IPv4 or
IPv6 prefix lengths, possibly triggering a buffer overflow. (CAN-2003-0429)

The SPNEGO dissector in Ethereal 0.9.12 and earlier allows remote attackers
to cause a denial of service (crash) via an invalid ASN.1 value. 
(CAN-2003-0430)

The tvb_get_nstringz0 function in Ethereal 0.9.12 and earlier does not
properly handle a zero-length buffer size. (CAN-2003-0431)

Ethereal 0.9.12 and earlier does not handle certain strings properly in the
BGP, WTP, DNS, 802.11, ISAKMP, WSP, CLNP, ISIS, and RMI dissectors.
(CAN-2003-0432)

Users of Ethereal should update to the erratum packages containing Ethereal
version 0.9.13, which are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network.  To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

85179 - SOCKS format string vuln in Ethereal 0.9.8/9

6. RPMs required:

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/ethereal-0.9.13-1.72.1.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/ethereal-0.9.13-1.72.1.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/ethereal-gnome-0.9.13-1.72.1.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/ethereal-0.9.13-1.72.1.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/ethereal-gnome-0.9.13-1.72.1.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/ethereal-0.9.13-1.73.1.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/ethereal-0.9.13-1.73.1.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/ethereal-gnome-0.9.13-1.73.1.i386.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/ethereal-0.9.13-1.80.1.src.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/ethereal-0.9.13-1.80.1.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/ethereal-gnome-0.9.13-1.80.1.i386.rpm

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/ethereal-0.9.13-1.90.1.src.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/ethereal-0.9.13-1.90.1.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/ethereal-gnome-0.9.13-1.90.1.i386.rpm



7. Verification:

MD5 sum                          Package Name
- - --------------------------------------------------------------------------
bd9ea773029a00543c2b86efd2f253db 7.2/en/os/SRPMS/ethereal-0.9.13-1.72.1.src.rpm
adda580cd763deba0940b47d2cb28f20 7.2/en/os/i386/ethereal-0.9.13-1.72.1.i386.rpm
dbe53fa5716f9cee9859c1d4435d2e76 7.2/en/os/i386/ethereal-gnome-0.9.13-1.72.1.i386rpm
52f6b8ceacc3946743c116ea41af9651 7.2/en/os/ia64/ethereal-0.9.13-1.72.1.ia64.rpm
23de069f33cd2da4c40c60288ae9e10b 7.2/en/os/ia64/ethereal-gnome-0.9.13-1.72.1.ia64.rpm
189f889e31de3bb9efd06b55282f741e 7.3/en/os/SRPMS/ethereal-0.9.13-1.73.1.src.rpm
3bc7319ef3cf5dcd3fc491eb323bd473 7.3/en/os/i386/ethereal-0.9.13-1.73.1.i386.rpm
a7c84fc309ff33b5666de9f298946f6f 7.3/en/os/i386/ethereal-gnome-0.9.13-1.73.1.i386.rpm
ac016f9ed706b0cf8d75be2ccced0a4c 8.0/en/os/SRPMS/ethereal-0.9.13-1.80.1.src.rpm
3ab512b8de7c7ad17bf43b7b0d4307ed 8.0/en/os/i386/ethereal-0.9.13-1.80.1.i386.rpm
0f4961aa67c6540c735c9ed4959881ef 8.0/en/os/i386/ethereal-gnome-0.9.13-1.80.1.i386.rpm
28cd7262e8f2d814bec2a871961d7444 9/en/os/SRPMS/ethereal-0.9.13-1.90.1.src.rpm
7253c66d80ce49bc79c0cd8749c710e3 9/en/os/i386/ethereal-0.9.13-1.90.1.i386.rpm
3d3394064db2d9ece3568b6af251575a 9/en/os/i386/ethereal-gnome-0.9.13-1.90.1.i386.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from http://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


8. References:

http://www.ethereal.com/appnotes/enpa-sa-00009.html
http://www.ethereal.com/appnotes/enpa-sa-00010.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0428
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (SunOS)
Comment: Processed by Mailcrypt 3.5.8 <http://mailcrypt.sourceforge.net/>

iQEVAwUBPwU3GeI9ttyl3QPRAQFXhAf/ZVSJcBuNfJb8bV/XnGS0wKo/mqD9rCH1
dyRKsaH04OLZ8dvMb2fDVoNPhrSYV2G6lO+NLjEKHMtjyGBMmMKiIdsT+W55HQ1w
62DOumP7xaUaJGzIUPUe0PwdYctkOu/jeIuZy/8h0GyZKy7hQcm6KAOQlWHanbGQ
YcshJ9owJNMGoi0ojZa3IjvoBGkrPz9V4HXe78b2ZCqw1HT465hIooFgEswa5uJJ
aDFkHHQfKmQ+gZFQA9O3MKA2Exiu3FojCiqTEUaoa2jyJWGTBNwH1+BHG0bk/a0m
241Yo0pIfCNXHAmSUbgE/8TqsTGJZpda5BLFHSQdINvgFa4odX7tzg==
=nnIJ
-----END PGP SIGNATURE-----