int(1971)

Vulnerability Bulletins


Denegación de servicio en Ethereal

Vulnerability classification

Property Value
Confidence level Oficial
Impact Denegación de Servicio
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio exotico

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Ethereal 0.10.13

Description

Se ha descubierto una vulnerabilidad en Ethereal hasta la versión 0.10.13. La vulnerabilidad reside en que el disector del protocolo IRC puede entrar en un bucle infinito.

Un atacante remoto podría causar una denegación de servicio mediante paquetes especialmente diseñados.

Solution



Actualización de software

Ethereal
Ethereal 0.10.14
http://www.ethereal.com/download.html#releases

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux

Mandriva Linux

Mandrivalinux 2006
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/ethereal-0.10.14-0.1.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/ethereal-tools-0.10.14-0.1.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/libethereal0-0.10.14-0.1.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/tethereal-0.10.14-0.1.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/ethereal-0.10.14-0.1.20060mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/ethereal-0.10.14-0.1.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/ethereal-tools-0.10.14-0.1.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/lib64ethereal0-0.10.14-0.1.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/tethereal-0.10.14-0.1.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/SRPMS/ethereal-0.10.14-0.1.20060mdk.src.rpm

Red Hat
Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
https://rhn.redhat.com/

SGI
Advanced Linux Environment 3 / RPM / Patch 10265
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS
Advanced Linux Environment 3 / SRPM / Patch 10265
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS

Standar resources

Property Value
CVE CVE-2005-3313
BID

Other resources

SUSE Security Advisory (SUSE-SR:2005:025)
http://www.novell.com/linux/security/advisories/2005_25_sr.html

SUSE Security Advisory (SUSE-SA:2005:056)
http://www.novell.com/linux/security/advisories/2006_05_sr.html

Ethereal Security Advisory enpa-sa-00022
http://www.ethereal.com/appnotes/enpa-sa-00022.html

Mandriva Security Advisory MDKSA-2006:002
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:002

Red Hat Security Advisory (RHSA-2006:0156-6)
https://rhn.redhat.com/errata/RHSA-2006-0156.html

SGI Security Advisory (20060201-01-U)
ftp://patches.sgi.com/support/free/security/advisories/20060201-01.U.asc

Version history

Version Comments Date
1.0 Aviso emitido 2005-11-14
1.1 Publicado Ethereal 0.10.14 2006-01-03
1.2 Aviso emitido por Mandriva (MDKSA-2006:002) 2006-01-04
1.3 Aviso emitido por Red Hat (RHSA-2006:0156-6) 2006-01-12
1.4 Aviso emitido por SGI (20060201-01-U) 2006-02-20
1.5 Aviso emitido por Suse (SUSE-SR:2006:005) 2006-03-06
Ministerio de Defensa
CNI
CCN
CCN-CERT