Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200512-06 ] Ethereal: Buffer overflow in OSPF protocol dissector
Date: Wed, 14 Dec 2005 18:18:11
Message-Id: 43A05BCE.8080501@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200512-06
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Ethereal: Buffer overflow in OSPF protocol dissector
9 Date: December 14, 2005
10 Bugs: #115030
11 ID: 200512-06
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Ethereal is missing bounds checking in the OSPF protocol dissector that
19 could lead to abnormal program termination or the execution of
20 arbitrary code.
21
22 Background
23 ==========
24
25 Ethereal is a feature-rich network protocol analyzer. It provides
26 protocol analyzers for various network flows, including one for Open
27 Shortest Path First (OSPF) Interior Gateway Protocol.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 net-analyzer/ethereal < 0.10.13-r2 >= 0.10.13-r2
36
37 Description
38 ===========
39
40 iDEFENSE reported a possible overflow due to the lack of bounds
41 checking in the dissect_ospf_v3_address_prefix() function, part of the
42 OSPF protocol dissector.
43
44 Impact
45 ======
46
47 An attacker might be able to craft a malicious network flow that would
48 crash Ethereal. It may be possible, though unlikely, to exploit this
49 flaw to execute arbitrary code with the permissions of the user running
50 Ethereal, which could be the root user.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 All Ethereal users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.13-r2"
64
65 References
66 ==========
67
68 [ 1 ] CVE-2005-3651
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3651
70 [ 2 ] iDEFENSE Advisory
71
72 http://www.idefense.com/application/poi/display?id=349&type=vulnerabilities
73
74 Availability
75 ============
76
77 This GLSA and any updates to it are available for viewing at
78 the Gentoo Security Website:
79
80 http://security.gentoo.org/glsa/glsa-200512-06.xml
81
82 Concerns?
83 =========
84
85 Security is a primary focus of Gentoo Linux and ensuring the
86 confidentiality and security of our users machines is of utmost
87 importance to us. Any security concerns should be addressed to
88 security@g.o or alternatively, you may file a bug at
89 http://bugs.gentoo.org.
90
91 License
92 =======
93
94 Copyright 2005 Gentoo Foundation, Inc; referenced text
95 belongs to its owner(s).
96
97 The contents of this document are licensed under the
98 Creative Commons - Attribution / Share Alike license.
99
100 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature