- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200306-13
- - - ---------------------------------------------------------------------

          PACKAGE : ethereal
          SUMMARY : arbitrary code execution
             DATE : 2003-06-25 22:36 UTC
          EXPLOIT : remote
VERSIONS AFFECTED : =ethereal-0.9.13
              CVE : CAN-2003-0432

- - - ---------------------------------------------------------------------

from advisory: 
"It may be possible to make Ethereal crash or run arbitrary code by 
injecting a purposefully malformed packet onto the wire, or by convincing 
someone to read a malformed packet trace file."

Read the full advisory at 


SOLUTION

It is recommended that all Gentoo Linux users who are running
net-analyzer/ethereal upgrade to ethereal as follows

emerge sync
emerge ethereal
emerge clean

- - - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at   
- - - ---------------------------------------------------------------------

Gentoo: ethereal arbitrary code execution vulnerability

It may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully malformed packet onto the wire, or by convincing someone to read a malformed packet trac...

Summary


GENTOO LINUX SECURITY ANNOUNCEMENT 200306-13


from advisory: "It may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully malformed packet onto the wire, or by convincing someone to read a malformed packet trace file."
Read the full advisory at

SOLUTION
It is recommended that all Gentoo Linux users who are running net-analyzer/ethereal upgrade to ethereal as follows
emerge sync emerge ethereal emerge clean
aliz@gentoo.org - GnuPG key is available at

Resolution

References

Availability

Concerns

Severity
PACKAGE : ethereal
SUMMARY : arbitrary code execution
DATE : 2003-06-25 22:36 UTC
EXPLOIT : remote
VERSIONS AFFECTED : =ethereal-0.9.13
CVE : CAN-2003-0432

Synopsis

Background

Affected Packages

Impact

Workaround

Related News