rPath Security Advisory: 2006-0132-1 Published: 2006-07-19 Products: rPath Linux 1 Rating: Severe Exposure Level Classification: Remote Root Deterministic Unauthorized Access Updated Versions: wireshark=/conary.rpath.com@rpl:devel//1/0.99.2-2.2-1 tshark=/conary.rpath.com@rpl:devel//1/0.99.2-2.2-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632 http://www.wireshark.org/security/wnpa-sec-2006-01.html Description: All versions of the ethereal and tethereal packages contain vulnerabilities in packet dissector modules, which may allow various attacks including subverting the user who is running ethereal. Since ethereal is generally run as root to view network traffic directly, this may allow complete access to the vulnerable system. The fixes are available only as part of the wireshark package. Development of the ethereal program has ceased under the ethereal name and continued under the wireshark name, due to restrictions on the use of the "ethereal" trademark. The latest version of the ethereal and tethereal packages in rPath Linux 1 are now redirects to the wireshark and tshark packages. The command "conary update ethereal tethereal" will cause the ethereal and tethereal packages on the system to be replaced by wireshark and tshark, respectively. The "conary updateall" command will also appropriately migrate the system from ethereal to wireshark. The fix for this vulnerability is available in the wireshark and tshark packages. rPath strongly recommends that you update to the wireshark and/or tshark packages, and that you not use the affected ethereal and tethereal packages, particularly not on untrusted networks or trace files.