Debian: New ethereal packages fix execution of arbitrary code
Summary
It was discovered that the Q.2391 dissector is vulnerable to denial
of service caused by memory exhaustion.
CVE-2005-3241
It was discovered that the FC-FCS, RSVP and ISIS-LSP dissectors are
vulnerable to denial of service caused by memory exhaustion.
CVE-2005-3242
It was discovered that the IrDA and SMB dissectors are vulnerable to
denial of service caused by memory corruption.
CVE-2005-3243
It was discovered that the SLIMP3 and AgentX dissectors are vulnerable
to code injection caused by buffer overflows.
CVE-2005-3244
It was discovered that the BER dissector is vulnerable to denial of
service caused by an infinite loop.
CVE-2005-3246
It was discovered that the NCP and RTnet dissectors are vulnerable to
denial of service caused by a null pointer dereference.
CVE-2005-3248
It was discovered that the X11 dissector is vulnerable denial of service
caused by a division through zero.
This update also fixes a 64 bit-specific regression in the ASN.1 decoder, which
has been introduced in a previous DSA.
For the stable distribution (sarge) these problems have been fixed in
version 0.10.10-2sarge8.
For the unstable distribution (sid) these problems have been fixed in
version 0.99.2-5.1 of wireshark, the network sniffer formerly known as
ethereal.
We recommend that you upgrade your ethereal packages.
Upgrade Instructions
- --------------------wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Source archives:
Size/MD5 checksum: 855 159309d848ffa90cb5ae336582a8e7d4
Size/MD5 checksum: 7411510 e6b74468412c17bb66cd459bfb61471c
Size/MD5 checksum: 177921 ee1ce43eb48106f1fc0b75bc9ff3c241
alpha architecture (DEC Alpha)
Size/MD5 checksum: 5476146 cf5b01f923e68a3f07d0080ef69f2b57
Size/MD5 checksum: 154566 615069b5905d6c2aec9a357eb0dd1306
Size/MD5 checksum: 106250 cfe9461049fc5e1997d68cbd1a6d6b78
Size/MD5 checksum: 543034 5c9eaadae44224a002902c4196847aa0
amd64 architecture (AMD x86_64 (AMD64))
Size/MD5 checksum: 154556 67cfc697c120e54c489e1552b1a58b6e
Size/MD5 checksum: 99542 09093de7c28ec1741106dac694ffcae3
Size/MD5 checksum: 486502 addeab1c3d70537c088574f9f68e6e6d
Size/MD5 checksum: 5334616 1700b3e18c2b45594cbb80ef2ea58019
arm architecture (ARM)
Size/MD5 checksum: 95616 39dbfe3ac08048f95b19d74c644b780c
Size/MD5 checksum: 154596 209d45b3ebf7ba313bb7db0c00a095bd
Size/MD5 checksum: 472996 5f0d04db811734c1f1c8c814c93ceaaa
Size/MD5 checksum: 4687892 5b2737d93a7e3673630e96744f648b51
hppa architecture (HP PA RISC)
Size/MD5 checksum: 5787290 f36dc8ae6a78acb2d6a8fa71b18af9cc
Size/MD5 checksum: 154576 5ce456fee2af8fb5b4f19d786166faf6
Size/MD5 checksum: 489292 71832119d10ab77eb4547840cf7d3504
Size/MD5 checksum: 98452 94aae2f351900a65edfddcae9e880bf6
i386 architecture (Intel ia32)
Size/MD5 checksum: 443646 f830051bf5920e2999a8ef9bab332ed2
Size/MD5 checksum: 4529156 4f6c8ec5448ea7b6aa826fce639a5781
Size/MD5 checksum: 90878 45f09d9fe820e537fd9e140fbe86de07
Size/MD5 checksum: 154556 a1a78549f0981eb9aa0f77fdd9ce612b
ia64 architecture (Intel ia64)
Size/MD5 checksum: 6630098 82fc3ba6dd822ee192c2050dc6f38dcf
Size/MD5 checksum: 674420 9b84646b4f81e1c9415656768f6dc687
Size/MD5 checksum: 129156 c3deca896916d3a3d1c1065f5e2717c8
Size/MD5 checksum: 154554 e8a6435b4e1287af4ebfe3cb606c74af
m68k architecture (Motorola Mc680x0)
Size/MD5 checksum: 90904 ab21fa89ad4a12f8e0c579872a1c07c4
Size/MD5 checksum: 154614 b384ae036ab5c2b85f62af368b689a04
Size/MD5 checksum: 447752 6a8378ecb8337071ef8b1199529700be
Size/MD5 checksum: 5565186 647220c660fd8546c9ca4a18e9d7a792
mips architecture (MIPS (Big Endian))
Size/MD5 checksum: 154572 434928f40a6b3e4bf2d7dce6beb72edb
Size/MD5 checksum: 94736 4eb62077c31de2ac2ec10a760199b9eb
Size/MD5 checksum: 4723218 9c827aab812bef7a58d5429ee8287d74
Size/MD5 checksum: 462746 fa7d8236f1407836dcc601317afa8df2
mipsel architecture (MIPS (Little Endian))
Size/MD5 checksum: 94650 7f64290882d7c8c579818fdc1c7e215b
Size/MD5 checksum: 154584 934dc675944e857216c72fc29ec46a55
Size/MD5 checksum: 458030 487ea6f3a1fd7620b4ae33f4d5e8c8c3
Size/MD5 checksum: 4460700 e0062d687a84b9782e645b0d72cbb248
powerpc architecture (PowerPC)
Size/MD5 checksum: 455716 a203882270b251513b2269b688d59256
Size/MD5 checksum: 5068470 7976f110d32b6bb83c00afa49fd75493
Size/MD5 checksum: 154570 7622c3b6ca781d622cb305e9a485f447
Size/MD5 checksum: 94320 5e5391b1f1dc2bc4992582930e28f2a3
s390 architecture (IBM S/390)
Size/MD5 checksum: 5621642 092cf076ce4e6fd479ea09fdb14d6e87
Size/MD5 checksum: 154566 f3dae98783c87fb3ff088be62608aef7
Size/MD5 checksum: 479662 e4b854e30aa801eb67a33d1077eb1e9b
Size/MD5 checksum: 99904 0516f4694b47ae4637b09e82d321eecc
sparc architecture (Sun SPARC/UltraSPARC)
Size/MD5 checksum: 5130234 44a97eeb06a2d82bbbcfba2712700792
Size/MD5 checksum: 93828 4f44e9be92792058641044db66993758
Size/MD5 checksum: 465390 42670783f2750c3d5f426fe76bd17696
Size/MD5 checksum: 154566 6f25990f50443c48e802e29881ddc3ff
These files will probably be moved into the stable distribution on
its next update.
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org