[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 384/03 - Red Hat - Updated unzip + Ethereal packages fix vulnerabilities



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 384/03 dated 04.07.03  Time: 11:46
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Two Red Hat Security Advisories:

1: Updated unzip packages fix trojan vulnerability

2: Updated Ethereal packages fix security issues

Detail
====== 

1: Updated unzip packages fix trojan vulnerability

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated unzip packages fix trojan vulnerability
Advisory ID:       RHSA-2003:199-01
Issue date:        2003-07-01
Updated on:        2003-07-01
Product:           Red Hat Linux
Keywords:          unzip control characters
Cross references:  
Obsoletes:         RHSA-2002:096
CVE Names:         CAN-2003-0282
- - ---------------------------------------------------------------------

1. Topic:

Updated unzip packages resolving a vulnerability allowing arbitrary files
to be overwritten are now available.

2. Relevant releases/architectures:

Red Hat Linux 7.1 - i386
Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
Red Hat Linux 9 - i386

3. Problem description:

The unzip utility is used for manipulating archives, which are multiple
files stored inside of a single file.

A vulnerabilitiy in unzip version 5.50 and earlier allows attackers to
overwrite arbitrary files during archive extraction by placing invalid
(non-printable) characters between two "." characters.  These non-printable
characters are filtered, resulting in a ".." sequence.  The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0282 to this issue.

This erratum includes a patch ensuring that non-printable characters do not
make it possible for a malicious .zip file to write to parent directories
unless the "-:" command line parameter is specified.

Users of unzip are advised to upgrade to these updated packages, which are
not vulnerable to this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

97301 - vulnerability in unzip 5.50 allows malicious zip file to write to ../

6. RPMs required:

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/unzip-5.50-11.src.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/unzip-5.50-11.i386.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/unzip-5.50-11.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/unzip-5.50-11.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/unzip-5.50-11.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/unzip-5.50-11.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/unzip-5.50-11.i386.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/unzip-5.50-12.src.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/unzip-5.50-12.i386.rpm

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/unzip-5.50-14.src.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/unzip-5.50-14.i386.rpm



7. Verification:

MD5 sum                          Package Name
- - --------------------------------------------------------------------------
627c65d2643152f360a4b7f8ebacf993 7.1/en/os/SRPMS/unzip-5.50-11.src.rpm
c37b3635f768ca248ef6486f38a4cfb1 7.1/en/os/i386/unzip-5.50-11.i386.rpm
627c65d2643152f360a4b7f8ebacf993 7.2/en/os/SRPMS/unzip-5.50-11.src.rpm
c37b3635f768ca248ef6486f38a4cfb1 7.2/en/os/i386/unzip-5.50-11.i386.rpm
e1cb9d0c5312667c601e3a04e160ea3c 7.2/en/os/ia64/unzip-5.50-11.ia64.rpm
627c65d2643152f360a4b7f8ebacf993 7.3/en/os/SRPMS/unzip-5.50-11.src.rpm
c37b3635f768ca248ef6486f38a4cfb1 7.3/en/os/i386/unzip-5.50-11.i386.rpm
b06d287ae9708615d9c8201addd84ceb 8.0/en/os/SRPMS/unzip-5.50-12.src.rpm
14e662c115aab0fd073602a2637c306a 8.0/en/os/i386/unzip-5.50-12.i386.rpm
da4837981a5363b178185c3d53bfe3f5 9/en/os/SRPMS/unzip-5.50-14.src.rpm
12b5697f11ad09959e9f51d570c37268 9/en/os/i386/unzip-5.50-14.i386.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from http://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


8. References:

http://marc.theaimsgroup.com/?l=bugtraq&m=105259038503175
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0282

9. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at http://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/AVGuXlSAg2UNWIIRAoLUAKC9LELjftdBN9EPto4l4YrglsDMNgCdEx0e
MhLunrnPWYTMmPlulWP/ypo=
=onyG
- -----END PGP SIGNATURE-----

2: Updated Ethereal packages fix security issues

- - -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated Ethereal packages fix security issues
Advisory ID:       RHSA-2003:203-01
Issue date:        2003-07-03
Updated on:        2003-07-03
Product:           Red Hat Linux
Keywords:          ethereal SOCKS buffer overflow
Cross references:  
Obsoletes:         RHSA-2003:076
CVE Names:         CAN-2003-0356 CAN-2003-0357 CAN-2003-0428 CAN-2003-0429 CAN-2003-0430 CAN-2003-0431 CAN-2003-0432
- - - ---------------------------------------------------------------------

1. Topic:

Updated Ethereal packages available to fix a number of remotely
exploitable security issues

2. Relevant releases/architectures:

Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
Red Hat Linux 9 - i386

3. Problem description:

Ethereal is a program for monitoring network traffic.

A number of security issues affect Ethereal.  By exploiting these issues it
may be possible to make Ethereal crash or run arbitrary code by injecting a
purposefully malformed packet onto the wire or by convincing someone to
read a malformed packet trace file.

Multiple off-by-one vulnerabilities exist in Ethereal 0.9.11 and earlier in
the AIM, GIOP Gryphon, OSPF, PPTP, Quake, Quake2, Quake3, Rsync, SMB, SMPP,
and TSP dissectors. They do not properly use the tvb_get_nstringz and
tvb_get_nstringz0 functions.   Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0356 to these issues.

Multiple integer overflow vulnerabilities exist in Ethereal 0.9.11 and
earlier in the Mount and PPP dissectors.  (CAN-2003-0357)

A vulnerability in the DCERPC dissector exists in Ethereal 0.9.12 and
earlier, allowing remote attackers to cause a denial of service (memory
consumption) via a certain NDR string.  (CAN-2003-0428)

The OSI dissector in Ethereal 0.9.12 and earlier causes by invalid IPv4 or
IPv6 prefix lengths, possibly triggering a buffer overflow. (CAN-2003-0429)

The SPNEGO dissector in Ethereal 0.9.12 and earlier allows remote attackers
to cause a denial of service (crash) via an invalid ASN.1 value. 
(CAN-2003-0430)

The tvb_get_nstringz0 function in Ethereal 0.9.12 and earlier does not
properly handle a zero-length buffer size. (CAN-2003-0431)

Ethereal 0.9.12 and earlier does not handle certain strings properly in the
BGP, WTP, DNS, 802.11, ISAKMP, WSP, CLNP, ISIS, and RMI dissectors.
(CAN-2003-0432)

Users of Ethereal should update to the erratum packages containing Ethereal
version 0.9.13, which are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network.  To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

85179 - SOCKS format string vuln in Ethereal 0.9.8/9

6. RPMs required:

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/ethereal-0.9.13-1.72.1.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/ethereal-0.9.13-1.72.1.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/ethereal-gnome-0.9.13-1.72.1.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/ethereal-0.9.13-1.72.1.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/ethereal-gnome-0.9.13-1.72.1.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/ethereal-0.9.13-1.73.1.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/ethereal-0.9.13-1.73.1.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/ethereal-gnome-0.9.13-1.73.1.i386.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/ethereal-0.9.13-1.80.1.src.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/ethereal-0.9.13-1.80.1.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/ethereal-gnome-0.9.13-1.80.1.i386.rpm

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/ethereal-0.9.13-1.90.1.src.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/ethereal-0.9.13-1.90.1.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/ethereal-gnome-0.9.13-1.90.1.i386.rpm



7. Verification:

MD5 sum                          Package Name
- - - --------------------------------------------------------------------------
bd9ea773029a00543c2b86efd2f253db 7.2/en/os/SRPMS/ethereal-0.9.13-1.72.1.src.rpm
adda580cd763deba0940b47d2cb28f20 7.2/en/os/i386/ethereal-0.9.13-1.72.1.i386.rpm
dbe53fa5716f9cee9859c1d4435d2e76 7.2/en/os/i386/ethereal-gnome-0.9.13-1.72.1.i386.rpm
52f6b8ceacc3946743c116ea41af9651 7.2/en/os/ia64/ethereal-0.9.13-1.72.1.ia64.rpm
23de069f33cd2da4c40c60288ae9e10b 7.2/en/os/ia64/ethereal-gnome-0.9.13-1.72.1.ia64.rpm
189f889e31de3bb9efd06b55282f741e 7.3/en/os/SRPMS/ethereal-0.9.13-1.73.1.src.rpm
3bc7319ef3cf5dcd3fc491eb323bd473 7.3/en/os/i386/ethereal-0.9.13-1.73.1.i386.rpm
a7c84fc309ff33b5666de9f298946f6f 7.3/en/os/i386/ethereal-gnome-0.9.13-1.73.1.i386.rpm
ac016f9ed706b0cf8d75be2ccced0a4c 8.0/en/os/SRPMS/ethereal-0.9.13-1.80.1.src.rpm
3ab512b8de7c7ad17bf43b7b0d4307ed 8.0/en/os/i386/ethereal-0.9.13-1.80.1.i386.rpm
0f4961aa67c6540c735c9ed4959881ef 8.0/en/os/i386/ethereal-gnome-0.9.13-1.80.1.i386.rpm
28cd7262e8f2d814bec2a871961d7444 9/en/os/SRPMS/ethereal-0.9.13-1.90.1.src.rpm
7253c66d80ce49bc79c0cd8749c710e3 9/en/os/i386/ethereal-0.9.13-1.90.1.i386.rpm
3d3394064db2d9ece3568b6af251575a 9/en/os/i386/ethereal-gnome-0.9.13-1.90.1.i386.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from http://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


8. References:

http://www.ethereal.com/appnotes/enpa-sa-00009.html
http://www.ethereal.com/appnotes/enpa-sa-00010.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0428
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0432

9. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at http://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.
- - -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/A+xHXlSAg2UNWIIRAiSzAJ4wLIpCBtj5OaeBperd8KyYn6sPygCgvgKX
/PaF1t5blvDoZbttv6usTy4=
=PgE5
- - -----END PGP SIGNATURE-----

- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Red Hat for the information
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBPwVay4pao72zK539AQFSBQQAk6KhqHlNyEKjku+XVyY/TeBKSFDOdqqv
OIn2/dXbhPFRBX7aX8/vfYtMvg9W0dLHdwlIVYwaZhUPPxBkFI/J/G/1mrBV+4Rc
SEdeDi5x8N5eoAPJgxZWvZ+C7Qi6WoExiycj7dqAlDjTcz3bjSWedXgYWdZ73FIG
3hIL6n+9EQ0=
=Iegs
-----END PGP SIGNATURE-----