Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200607-09 ] Wireshark: Multiple vulnerabilities
Date: Tue, 25 Jul 2006 15:36:53
Message-Id: 200607251601.27915.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200607-09
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Wireshark: Multiple vulnerabilities
9 Date: July 25, 2006
10 Bugs: #140856
11 ID: 200607-09
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Wireshark (formerly known as Ethereal) is vulnerable to several
19 security issues, potentially allowing the execution of arbitrary code
20 by a remote attacker.
21
22 Background
23 ==========
24
25 Wireshark, formerly known as Ethereal, is a popular network protocol
26 analyzer.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 net-analyzer/wireshark < 0.99.2 >= 0.99.2
35 2 net-analyzer/ethereal <= 0.99.0-r1 Vulnerable!
36 -------------------------------------------------------------------
37 NOTE: Certain packages are still vulnerable. Users should migrate
38 to another package if one is available or wait for the
39 existing packages to be marked stable by their
40 architecture maintainers.
41 -------------------------------------------------------------------
42 2 affected packages on all of their supported architectures.
43 -------------------------------------------------------------------
44
45 Description
46 ===========
47
48 Wireshark dissectors have been found vulnerable to a large number of
49 exploits, including off-by-one errors, buffer overflows, format string
50 overflows and an infinite loop.
51
52 Impact
53 ======
54
55 Running an affected version of Wireshark or Ethereal could allow for a
56 remote attacker to execute arbitrary code on the user's computer by
57 sending specially crafted packets.
58
59 Workaround
60 ==========
61
62 There is no known workaround at this time.
63
64 Resolution
65 ==========
66
67 All Wireshark users should upgrade to the latest version:
68
69 # emerge --sync
70 # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2"
71
72 All Ethereal users should migrate to Wireshark:
73
74 # emerge --sync
75 # emerge --ask --unmerge net-analyzer/ethereal
76 # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2"
77
78 To keep the [saved] configuration from Ethereal and reuse it with
79 Wireshark:
80
81 # mv ~/.ethereal ~/.wireshark
82
83 References
84 ==========
85
86 [ 1 ] Wireshark wnpa-sec-2006-01
87 http://www.wireshark.org/security/wnpa-sec-2006-01.html
88 [ 2 ] CVE-2006-3627
89 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627
90 [ 3 ] CVE-2006-3628
91 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628
92 [ 4 ] CVE-2006-3629
93 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629
94 [ 5 ] CVE-2006-3630
95 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630
96 [ 6 ] CVE-2006-3631
97 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631
98 [ 7 ] CVE-2006-3632
99 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632
100
101 Availability
102 ============
103
104 This GLSA and any updates to it are available for viewing at
105 the Gentoo Security Website:
106
107 http://security.gentoo.org/glsa/glsa-200607-09.xml
108
109 Concerns?
110 =========
111
112 Security is a primary focus of Gentoo Linux and ensuring the
113 confidentiality and security of our users machines is of utmost
114 importance to us. Any security concerns should be addressed to
115 security@g.o or alternatively, you may file a bug at
116 http://bugs.gentoo.org.
117
118 License
119 =======
120
121 Copyright 2006 Gentoo Foundation, Inc; referenced text
122 belongs to its owner(s).
123
124 The contents of this document are licensed under the
125 Creative Commons - Attribution / Share Alike license.
126
127 http://creativecommons.org/licenses/by-sa/2.5