what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

rPSA-2006-0132-1.txt

rPSA-2006-0132-1.txt
Posted Jul 24, 2006
Site rpath.com

rPath Security Advisory - All versions of the ethereal and tethereal packages contain vulnerabilities in packet dissector modules, which may allow various attacks including subverting the user who is running ethereal. Since ethereal is generally run as root to view network traffic directly, this may allow complete access to the vulnerable system.

tags | advisory, root, vulnerability
advisories | CVE-2006-3627, CVE-2006-3628, CVE-2006-3629, CVE-2006-3630, CVE-2006-3631, CVE-2006-3632
SHA-256 | c44a6d6485544a4f0867e5c2113e2255a5f08d8b4523239a0d24aa294287a2ef

rPSA-2006-0132-1.txt

Change Mirror Download
rPath Security Advisory: 2006-0132-1
Published: 2006-07-19
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
Remote Root Deterministic Unauthorized Access
Updated Versions:
wireshark=/conary.rpath.com@rpl:devel//1/0.99.2-2.2-1
tshark=/conary.rpath.com@rpl:devel//1/0.99.2-2.2-1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632
http://www.wireshark.org/security/wnpa-sec-2006-01.html

Description:
All versions of the ethereal and tethereal packages contain
vulnerabilities in packet dissector modules, which may allow various
attacks including subverting the user who is running ethereal.
Since ethereal is generally run as root to view network traffic
directly, this may allow complete access to the vulnerable system.

The fixes are available only as part of the wireshark package.
Development of the ethereal program has ceased under the ethereal
name and continued under the wireshark name, due to restrictions
on the use of the "ethereal" trademark. The latest version of the
ethereal and tethereal packages in rPath Linux 1 are now redirects
to the wireshark and tshark packages. The command "conary update
ethereal tethereal" will cause the ethereal and tethereal packages
on the system to be replaced by wireshark and tshark, respectively.
The "conary updateall" command will also appropriately migrate the
system from ethereal to wireshark.

The fix for this vulnerability is available in the wireshark and
tshark packages. rPath strongly recommends that you update to
the wireshark and/or tshark packages, and that you not use the
affected ethereal and tethereal packages, particularly not on
untrusted networks or trace files.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close