Your message dated Thu, 10 Mar 2005 05:02:12 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#298771: fixed in ethereal 0.10.9-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 9 Mar 2005 21:48:03 +0000
>From [EMAIL PROTECTED] Wed Mar 09 13:48:03 2005
Return-path: <[EMAIL PROTECTED]>
Received: from kitenet.net [64.62.161.42] (postfix)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1D992B-0002dF-00; Wed, 09 Mar 2005 13:48:03 -0800
Received: from dragon.kitenet.net (unknown [66.168.94.177])
        (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
        (Client CN "Joey Hess", Issuer "Joey Hess" (verified OK))
        by kitenet.net (Postfix) with ESMTP id 92A4918064
        for <[EMAIL PROTECTED]>; Wed,  9 Mar 2005 21:48:02 +0000 (GMT)
Received: by dragon.kitenet.net (Postfix, from userid 1000)
        id A576A6E352; Wed,  9 Mar 2005 16:50:58 -0500 (EST)
Date: Wed, 9 Mar 2005 16:50:57 -0500
From: Joey Hess <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: buffer overflow in dissect_a11_radius() (CAN-2005-0699)
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="LQksG6bCIzRHxTLp"
Content-Disposition: inline
X-Reportbug-Version: 3.8
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--LQksG6bCIzRHxTLp
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: ethereal
Version: 0.10.9-1
Severity: grave
Tags: security

  There is remote buffer overflow vulnerability in Ethereal dissector for=
=20
  CDMA2000 A11 packets. Vulnerability is located in dissect_a11_radius() fu=
nction=20
  in packet-3g-a11.c used for RADIUS authentication dissection. Number of b=
ytes=20
  that will be copied from packet to buffer in stack is taken from packet i=
tself.=20
  16 bytes are reserved for that buffer, and string length can be up to 256=
 bytes=20
  (unsigned char), so is possible to overflow local variables and return ad=
dress.=20

http://www.securityfocus.com/archive/1/392659

A fixed version should be released upstream on March 10th. I think a fix
is already available in upstream svn, based on this page:

http://www.securityfocus.com/bid/12759/solution/

--=20
see shy jo

--LQksG6bCIzRHxTLp
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCL2/Bd8HHehbQuO8RAjb+AJ9GMaxXOOCNclJnQKJDxhN8qZHoWACeO5tf
y4cJyiVDbMXLoDli2KCplsI=
=jmnb
-----END PGP SIGNATURE-----

--LQksG6bCIzRHxTLp--

---------------------------------------
Received: (at 298771-close) by bugs.debian.org; 10 Mar 2005 10:08:03 +0000
>From [EMAIL PROTECTED] Thu Mar 10 02:08:03 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1D9KaJ-0005IR-00; Thu, 10 Mar 2005 02:08:03 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1D9KUe-0003Kd-00; Thu, 10 Mar 2005 05:02:12 -0500
From: Frederic Peters <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#298771: fixed in ethereal 0.10.9-2
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 10 Mar 2005 05:02:12 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: ethereal
Source-Version: 0.10.9-2

We believe that the bug you reported is fixed in the latest version of
ethereal, which is due to be installed in the Debian FTP archive:

ethereal-common_0.10.9-2_i386.deb
  to pool/main/e/ethereal/ethereal-common_0.10.9-2_i386.deb
ethereal-dev_0.10.9-2_i386.deb
  to pool/main/e/ethereal/ethereal-dev_0.10.9-2_i386.deb
ethereal_0.10.9-2.diff.gz
  to pool/main/e/ethereal/ethereal_0.10.9-2.diff.gz
ethereal_0.10.9-2.dsc
  to pool/main/e/ethereal/ethereal_0.10.9-2.dsc
ethereal_0.10.9-2_i386.deb
  to pool/main/e/ethereal/ethereal_0.10.9-2_i386.deb
tethereal_0.10.9-2_i386.deb
  to pool/main/e/ethereal/tethereal_0.10.9-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Frederic Peters <[EMAIL PROTECTED]> (supplier of updated ethereal package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 10 Mar 2005 10:25:08 +0100
Source: ethereal
Binary: ethereal ethereal-dev tethereal ethereal-common
Architecture: source i386
Version: 0.10.9-2
Distribution: unstable
Urgency: high
Maintainer: Frederic Peters <[EMAIL PROTECTED]>
Changed-By: Frederic Peters <[EMAIL PROTECTED]>
Description: 
 ethereal   - network traffic analyzer
 ethereal-common - network traffic analyser (common files)
 ethereal-dev - network traffic analyser (development tools)
 tethereal  - network traffic analyzer (console)
Closes: 298771
Changes: 
 ethereal (0.10.9-2) unstable; urgency=high
 .
   * Backported packet-3g-a11.c from upstream subversion trunk.
     (fixes buffer overflows in 3G-A11 dissector)
     (CAN-2005-0699 (under review)) (closes: #298771)
Files: 
 1e068b7187a29d8ab3abae904916005e 840 net optional ethereal_0.10.9-2.dsc
 b4fcba900eedaac910627b4329665803 621567 net optional ethereal_0.10.9-2.diff.gz
 90dabba87cc2445dd4f8fbbd0b1495ce 4313216 net optional 
ethereal-common_0.10.9-2_i386.deb
 16d5e18de9bcdf7d042eb790c7cb862b 401656 net optional ethereal_0.10.9-2_i386.deb
 e36c2ff174fba85b4727aa6dfb2065ad 86552 net optional tethereal_0.10.9-2_i386.deb
 4b10f026d423c6f24f8e6467fd44aa3b 150620 devel optional 
ethereal-dev_0.10.9-2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCMBSkoR3LsWeD7V4RAselAJ4l/Sx5SF1uieC+oTWfEyGV6N9uawCfSMBg
94XXM1jsxIosE1yD1E+5Gs0=
=meW8
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to