Bugzilla – Bug 42347
several security problems in Ethereal 0.9.12
Last modified: 2021-09-25 14:32:51 UTC
http://www.ethereal.com/appnotes/enpa-sa-00010.html Description: Further source code auditing by Timo Sirainen has turned up several string handling flaws in various protocol dissectors. Separate security problems were discovered by other people: * The DCERPC dissector could try to allocate too much memory while trying to decode an NDR string. * Bad IPv4 or IPv6 prefix lengths could cause an overflow in the OSI dissector. * The SPNEGO dissector could segfault while parsing an invalid ASN.1 value. * The tvb_get_nstringz0() routine incorrectly handled a zero-length buffer size. * The BGP, WTP, DNS, 802.11, ISAKMP, WSP, CLNP, ISIS, and RMI dissectors handled strings improperly. Impact: It may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully malformed packet onto the wire, or by convincing someone to read a malformed packet trace file.
It looks like we need to create an update for this. Petr, can you do this, please?
yes I work on it, but backport for all old version take me some time ;(...
Sure, no problem. Just wanted to make sure we are on the same page :)
Related info (for tracking purposes and advisory) http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0428 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0429 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0431 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0432 http://www.ethereal.com/appnotes/enpa-sa-00010.html
And if possible please add the CAN ids to the changelog.
Fixed, now I waiting for p&p from Thomas
Created attachment 13088 [details] patchinfo
Created attachment 13089 [details] putonftp
Is this package tested enough too bypass QA testing?
I tested it but I think it needs to test more protocols than I did it.
Fixed packages and patchinfo were submited.
I think I will approve it w/o further testing.
Ok
So, I was thinking wrong. I needs testing. QA is informed.
Is the package from SuSE Linux 8.0 not affected? I didn't find a fixed version in the SuSE Linux 8.0 update tree of euklid.
The fix is on the way...
approved
CVE-2003-0432: CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)