TITLE: Fedora update for ethereal SECUNIA ADVISORY ID: SA19828 VERIFY ADVISORY: http://secunia.com/advisories/19828/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 5 http://secunia.com/product/8808/ DESCRIPTION: Fedora has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. For more information: SA19769 SOLUTION: Apply updated packages. Fedora Core 5: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ db2d1fa4854b097f2d5443b477219e2d07ab9242 SRPMS/ethereal-0.99.0-fc5.1.src.rpm 2a4443475f30970021161e5783fad691a3ca735c ppc/ethereal-0.99.0-fc5.1.ppc.rpm 52d37a0046435d710470ec8b82365b9a7f11adb4 ppc/ethereal-gnome-0.99.0-fc5.1.ppc.rpm b4fc06d09f40a9a2e860260985b08d3293f0923a ppc/debug/ethereal-debuginfo-0.99.0-fc5.1.ppc.rpm 97b4d5d2d9102f738756941f8c11cbc0a297c10b x86_64/ethereal-0.99.0-fc5.1.x86_64.rpm f18308798b547d5ebdd6343b5e721f451462db1c x86_64/ethereal-gnome-0.99.0-fc5.1.x86_64.rpm 289851bf8d2942a39bead770bda76b983606dbcc x86_64/debug/ethereal-debuginfo-0.99.0-fc5.1.x86_64.rpm 558e4618167c0667502d032fc60389199511e692 i386/ethereal-0.99.0-fc5.1.i386.rpm b0c8f0082befdfb6ecf8acdf5af575b30ad9b1de i386/ethereal-gnome-0.99.0-fc5.1.i386.rpm 1c5dc98172f23708dd31e3dfaea056e45237e528 i386/debug/ethereal-debuginfo-0.99.0-fc5.1.i386.rpm OTHER REFERENCES: SA19769: http://secunia.com/advisories/19769/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------