Security update for ethereal
Knowledgebase
(Last modified: 15JUL2003)
solutions Security update for ethereal SuSE Linux Maintenance Web (783e96c0180171d85ca7bb806adba5be)
SuSE Linux Admin-CD for Firewall
SuSE Firewall on CD 2 - VPN
SuSE Firewall on CD 2
SuSE Linux Enterprise Server for S/390
SuSE Linux Enterprise Server 8 for x86
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Openexchange Server 4
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Enterprise Server 8 for AMD64
Package: ethereal
Release: 20030715
Obsoletes: none
crash ethereal or to execute arbitrary code.
The following bugs will be removed with this update:
- The DCERPC dissector could try to allocate too much memory while trying to decode an NDR string.
- Bad IPv4 or IPv6 prefix lengths could cause an overflow in the OSI dissector.
- The SPNEGO dissector could segfault while parsing an invalid ASN.1 value.
- The tvb_get_nstringz0() routine incorrectly handled a zero-length buffer size.
- The BGP, WTP, DNS, 802.11, ISAKMP, WSP, CLNP, ISIS, and RMI dissectors handled strings improperly.
rpm -Fhv ethereal.rpm
Download Source Packages
Download the source code of the patches for maintained products.
Disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.