[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1VMdK1-0007xq-Cl@titan.mandriva.com>
Date: Thu, 19 Sep 2013 14:27:01 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2013:238 ] wireshark
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2013:238
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : wireshark
Date : September 19, 2013
Affected: Business Server 1.0, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Multiple vulnerabilities was found and corrected in Wireshark:
The dissect_nbap_T_dCH_ID function in epan/dissectors/packet-nbap.c
in the NBAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x
before 1.10.2 does not restrict the dch_id value, which allows
remote attackers to cause a denial of service (application crash)
via a crafted packet (CVE-2013-5718).
epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark
1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers
to cause a denial of service (infinite loop) via a crafted packet
(CVE-2013-5719).
Buffer overflow in the RTPS dissector in Wireshark 1.8.x before 1.8.10
and 1.10.x before 1.10.2 allows remote attackers to cause a denial
of service (application crash) via a crafted packet (CVE-2013-5720).
The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ
dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2
does not properly determine when to enter a certain loop, which allows
remote attackers to cause a denial of service (application crash)
via a crafted packet (CVE-2013-5721).
Unspecified vulnerability in the LDAP dissector in Wireshark 1.8.x
before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to
cause a denial of service (application crash) via a crafted packet
(CVE-2013-5722).
This advisory provides the latest supported version of Wireshark
(1.8.10) which is not vulnerable to these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722
https://www.wireshark.org/security/wnpa-sec-2013-55.html
https://www.wireshark.org/security/wnpa-sec-2013-56.html
https://www.wireshark.org/security/wnpa-sec-2013-57.html
https://www.wireshark.org/security/wnpa-sec-2013-58.html
https://www.wireshark.org/security/wnpa-sec-2013-59.html
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
de61ebb8817cb8039504ca524781c497 mes5/i586/dumpcap-1.8.10-0.1mdvmes5.2.i586.rpm
d829f01a5a5f860a6169131be9323981 mes5/i586/libwireshark2-1.8.10-0.1mdvmes5.2.i586.rpm
b68baa4354238f3193dce302690f3787 mes5/i586/libwireshark-devel-1.8.10-0.1mdvmes5.2.i586.rpm
c6ec2e0ece2af0f1fb61d9733e621f45 mes5/i586/rawshark-1.8.10-0.1mdvmes5.2.i586.rpm
1bee6bed84baba1cac9902f654213c76 mes5/i586/tshark-1.8.10-0.1mdvmes5.2.i586.rpm
c35b5c79b6a025dfe6d283a1a26409bf mes5/i586/wireshark-1.8.10-0.1mdvmes5.2.i586.rpm
a671049d8adb62f53db78830c5fd0e27 mes5/i586/wireshark-tools-1.8.10-0.1mdvmes5.2.i586.rpm
443c2e9cdc43786df065aba00f629d47 mes5/SRPMS/wireshark-1.8.10-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
d1b79b99e14e7d71cfab1f043fbf6724 mes5/x86_64/dumpcap-1.8.10-0.1mdvmes5.2.x86_64.rpm
2094e86f1dd8f0908b5931814b03d280 mes5/x86_64/lib64wireshark2-1.8.10-0.1mdvmes5.2.x86_64.rpm
41a032e6ea9401c3ba49c5b2a2a670bc mes5/x86_64/lib64wireshark-devel-1.8.10-0.1mdvmes5.2.x86_64.rpm
3dc07fa084199ba1cc6ebe6287e03583 mes5/x86_64/rawshark-1.8.10-0.1mdvmes5.2.x86_64.rpm
05b4625a36bf25b343574f30d9538029 mes5/x86_64/tshark-1.8.10-0.1mdvmes5.2.x86_64.rpm
02c751957b73bbe139523f4141d677fb mes5/x86_64/wireshark-1.8.10-0.1mdvmes5.2.x86_64.rpm
d8f93640400df0bb2f4823165cd8b738 mes5/x86_64/wireshark-tools-1.8.10-0.1mdvmes5.2.x86_64.rpm
443c2e9cdc43786df065aba00f629d47 mes5/SRPMS/wireshark-1.8.10-0.1mdvmes5.2.src.rpm
Mandriva Business Server 1/X86_64:
7e3729b680262732e67fe8235615fcdb mbs1/x86_64/dumpcap-1.8.10-1.mbs1.x86_64.rpm
cf73b7aef79429ed8e703e3aa8b62fa1 mbs1/x86_64/lib64wireshark2-1.8.10-1.mbs1.x86_64.rpm
1e65c4a4df9e4808ff6d5142851603b4 mbs1/x86_64/lib64wireshark-devel-1.8.10-1.mbs1.x86_64.rpm
772a7e69de64fe6523f0a9360132a251 mbs1/x86_64/rawshark-1.8.10-1.mbs1.x86_64.rpm
18f520b096e6a90e36c07253e3f06cd1 mbs1/x86_64/tshark-1.8.10-1.mbs1.x86_64.rpm
8153e002e9ad7cf5a9ba5e878e8a1dc1 mbs1/x86_64/wireshark-1.8.10-1.mbs1.x86_64.rpm
3b10fffd6e77b81865b05c77460a21e5 mbs1/x86_64/wireshark-tools-1.8.10-1.mbs1.x86_64.rpm
f573422739b5d540b16831abeea42823 mbs1/SRPMS/wireshark-1.8.10-1.mbs1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFSOsGdmqjQ0CJFipgRAjK7AJ481D98QuxscNqsQ3c4kTXFoD6dtQCg3/D4
UzUbyx2R+kXWR7StnovHZrg=
=fLCc
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists