Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 302665 (CVE-2010-0304) - <net-analyzer/wireshark-1.2.6: LWRES vulnerability (CVE-2010-0304)
Summary: <net-analyzer/wireshark-1.2.6: LWRES vulnerability (CVE-2010-0304)
Status: RESOLVED FIXED
Alias: CVE-2010-0304
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2010-01-28 17:57 UTC by Peter Volkov (RETIRED)
Modified: 2010-03-07 09:08 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Peter Volkov (RETIRED) gentoo-dev 2010-01-28 17:57:45 UTC
http://www.wireshark.org/security/wnpa-sec-2010-02.html

Babi discovered several buffer overflows in the LWRES dissector.
Versions affected: 0.9.15 to 1.0.10, 1.2.0 to 1.2.5 

Impact

It may be possible to make Wireshark crash remotely or by convincing someone to read a malformed packet trace file.
Resolution

Upgrade to Wireshark 1.2.6 or later.
Comment 1 Peter Volkov (RETIRED) gentoo-dev 2010-01-28 17:59:04 UTC
And new version is in the tree. Arch teams, please, stabilize.
Comment 2 Brent Baude (RETIRED) gentoo-dev 2010-01-28 20:23:28 UTC
ppc64 done
Comment 3 Brent Baude (RETIRED) gentoo-dev 2010-01-28 20:24:39 UTC
ppc done
Comment 4 Jeroen Roovers (RETIRED) gentoo-dev 2010-01-28 21:29:00 UTC
Stable for HPPA.
Comment 5 Raúl Porcel (RETIRED) gentoo-dev 2010-01-30 14:17:23 UTC
alpha/ia64/sparc/x86 stable
Comment 6 Peter Volkov (RETIRED) gentoo-dev 2010-01-30 15:07:29 UTC
amd64 done too.
Comment 7 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-03-02 09:47:27 UTC
CVE-2010-0304 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0304):
  Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15
  through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to
  cause a denial of service (crash) via a malformed packet, as
  demonstrated using a stack-based buffer overflow to the
  dissect_getaddrsbyname_request function.

Comment 8 Stefan Behte (RETIRED) gentoo-dev Security 2010-03-06 16:54:52 UTC
Sounds like an app crash to me.
GLSA vote: NO.
Comment 9 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-03-07 09:08:49 UTC
Closing noglsa.