lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1VMdK1-0007xq-Cl@titan.mandriva.com>
Date: Thu, 19 Sep 2013 14:27:01 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2013:238 ] wireshark

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:238
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : wireshark
 Date    : September 19, 2013
 Affected: Business Server 1.0, Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities was found and corrected in Wireshark:
 
 The dissect_nbap_T_dCH_ID function in epan/dissectors/packet-nbap.c
 in the NBAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x
 before 1.10.2 does not restrict the dch_id value, which allows
 remote attackers to cause a denial of service (application crash)
 via a crafted packet (CVE-2013-5718).
 
 epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark
 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers
 to cause a denial of service (infinite loop) via a crafted packet
 (CVE-2013-5719).
 
 Buffer overflow in the RTPS dissector in Wireshark 1.8.x before 1.8.10
 and 1.10.x before 1.10.2 allows remote attackers to cause a denial
 of service (application crash) via a crafted packet (CVE-2013-5720).
 
 The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ
 dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2
 does not properly determine when to enter a certain loop, which allows
 remote attackers to cause a denial of service (application crash)
 via a crafted packet (CVE-2013-5721).
 
 Unspecified vulnerability in the LDAP dissector in Wireshark 1.8.x
 before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to
 cause a denial of service (application crash) via a crafted packet
 (CVE-2013-5722).
 
 This advisory provides the latest supported version of Wireshark
 (1.8.10) which is not vulnerable to these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722
 https://www.wireshark.org/security/wnpa-sec-2013-55.html
 https://www.wireshark.org/security/wnpa-sec-2013-56.html
 https://www.wireshark.org/security/wnpa-sec-2013-57.html
 https://www.wireshark.org/security/wnpa-sec-2013-58.html
 https://www.wireshark.org/security/wnpa-sec-2013-59.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 de61ebb8817cb8039504ca524781c497  mes5/i586/dumpcap-1.8.10-0.1mdvmes5.2.i586.rpm
 d829f01a5a5f860a6169131be9323981  mes5/i586/libwireshark2-1.8.10-0.1mdvmes5.2.i586.rpm
 b68baa4354238f3193dce302690f3787  mes5/i586/libwireshark-devel-1.8.10-0.1mdvmes5.2.i586.rpm
 c6ec2e0ece2af0f1fb61d9733e621f45  mes5/i586/rawshark-1.8.10-0.1mdvmes5.2.i586.rpm
 1bee6bed84baba1cac9902f654213c76  mes5/i586/tshark-1.8.10-0.1mdvmes5.2.i586.rpm
 c35b5c79b6a025dfe6d283a1a26409bf  mes5/i586/wireshark-1.8.10-0.1mdvmes5.2.i586.rpm
 a671049d8adb62f53db78830c5fd0e27  mes5/i586/wireshark-tools-1.8.10-0.1mdvmes5.2.i586.rpm 
 443c2e9cdc43786df065aba00f629d47  mes5/SRPMS/wireshark-1.8.10-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 d1b79b99e14e7d71cfab1f043fbf6724  mes5/x86_64/dumpcap-1.8.10-0.1mdvmes5.2.x86_64.rpm
 2094e86f1dd8f0908b5931814b03d280  mes5/x86_64/lib64wireshark2-1.8.10-0.1mdvmes5.2.x86_64.rpm
 41a032e6ea9401c3ba49c5b2a2a670bc  mes5/x86_64/lib64wireshark-devel-1.8.10-0.1mdvmes5.2.x86_64.rpm
 3dc07fa084199ba1cc6ebe6287e03583  mes5/x86_64/rawshark-1.8.10-0.1mdvmes5.2.x86_64.rpm
 05b4625a36bf25b343574f30d9538029  mes5/x86_64/tshark-1.8.10-0.1mdvmes5.2.x86_64.rpm
 02c751957b73bbe139523f4141d677fb  mes5/x86_64/wireshark-1.8.10-0.1mdvmes5.2.x86_64.rpm
 d8f93640400df0bb2f4823165cd8b738  mes5/x86_64/wireshark-tools-1.8.10-0.1mdvmes5.2.x86_64.rpm 
 443c2e9cdc43786df065aba00f629d47  mes5/SRPMS/wireshark-1.8.10-0.1mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 7e3729b680262732e67fe8235615fcdb  mbs1/x86_64/dumpcap-1.8.10-1.mbs1.x86_64.rpm
 cf73b7aef79429ed8e703e3aa8b62fa1  mbs1/x86_64/lib64wireshark2-1.8.10-1.mbs1.x86_64.rpm
 1e65c4a4df9e4808ff6d5142851603b4  mbs1/x86_64/lib64wireshark-devel-1.8.10-1.mbs1.x86_64.rpm
 772a7e69de64fe6523f0a9360132a251  mbs1/x86_64/rawshark-1.8.10-1.mbs1.x86_64.rpm
 18f520b096e6a90e36c07253e3f06cd1  mbs1/x86_64/tshark-1.8.10-1.mbs1.x86_64.rpm
 8153e002e9ad7cf5a9ba5e878e8a1dc1  mbs1/x86_64/wireshark-1.8.10-1.mbs1.x86_64.rpm
 3b10fffd6e77b81865b05c77460a21e5  mbs1/x86_64/wireshark-tools-1.8.10-1.mbs1.x86_64.rpm 
 f573422739b5d540b16831abeea42823  mbs1/SRPMS/wireshark-1.8.10-1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFSOsGdmqjQ0CJFipgRAjK7AJ481D98QuxscNqsQ3c4kTXFoD6dtQCg3/D4
UzUbyx2R+kXWR7StnovHZrg=
=fLCc
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ