Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 264571 (CVE-2009-1210) - <net-analyzer/wireshark-1.0.7: Multiple Vulnerabilities (CVE-2009-{1210,1266,1268,1269})
Summary: <net-analyzer/wireshark-1.0.7: Multiple Vulnerabilities (CVE-2009-{1210,1266,...
Status: RESOLVED FIXED
Alias: CVE-2009-1210
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.wireshark.org/docs/relnote...
Whiteboard: B2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-04-01 23:40 UTC by Robert Buchholz (RETIRED)
Modified: 2009-06-30 18:12 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2009-04-01 23:40:12 UTC
CVE-2009-1210 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1210):
  Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector
  Wireshark 1.0.6 and earlier allows remote attackers to execute
  arbitrary code via a PN-DCP packet with format string specifiers in
  the station name.  NOTE: some of these details are obtained from
  third party information.
Comment 1 Peter Volkov (RETIRED) gentoo-dev 2009-04-03 15:10:48 UTC
Fix is already available but I think we better wait for official release as this package has a long history of similar issues...

http://anonsvn.wireshark.org/viewvc?view=rev&revision=27926
Comment 2 Peter Volkov (RETIRED) gentoo-dev 2009-04-09 12:19:50 UTC
wireshark-1.0.7 which fixes this issue was just added to the tree. Arch teams, please, stabilize.
Comment 3 Brent Baude (RETIRED) gentoo-dev 2009-04-09 15:43:22 UTC
ppc and ppc64 done
Comment 4 Tobias Heinlein (RETIRED) gentoo-dev 2009-04-10 08:13:29 UTC
amd64 stable
Comment 5 Raúl Porcel (RETIRED) gentoo-dev 2009-04-10 14:32:45 UTC
alpha/ia64/sparc/x86 stable
Comment 6 Jeroen Roovers (RETIRED) gentoo-dev 2009-04-11 04:57:46 UTC
Stable for HPPA.
Comment 7 Tobias Heinlein (RETIRED) gentoo-dev 2009-04-11 21:04:10 UTC
GLSA together with bug #242996, bug #248425 and bug #258013.
Comment 8 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-04-13 23:17:12 UTC
CVE-2009-1268 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1268):
  The Check Point High-Availability Protocol (CPHAP) dissector in
  Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a
  denial of service (crash) via a crafted FWHA_MY_STATE packet.

CVE-2009-1269 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1269):
  Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows
  remote attackers to cause a denial of service (crash) via a crafted
  Tektronix .rf5 file.
Comment 9 Robert Buchholz (RETIRED) gentoo-dev 2009-04-22 11:28:51 UTC
CVE-2009-1266 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1266):
  Unspecified vulnerability in Wireshark before 1.0.7-0.1-1 has unknown
  impact and attack vectors.

Comment 10 Wolfgang Goetz 2009-05-02 00:35:18 UTC
For reducing risk of root exploit the only suid/sgid program should be dumpcap.
therefore please remove in ebuild:
    fowners 0:wireshark /usr/bin/tshark
    fperms 6550 /usr/bin/tshark

Comment 11 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-05-02 07:38:04 UTC
(In reply to comment #10)
> For reducing risk of root exploit the only suid/sgid program should be dumpcap.
> therefore please remove in ebuild:
>     fowners 0:wireshark /usr/bin/tshark
>     fperms 6550 /usr/bin/tshark
> 

Please file a new bug for this.
Comment 12 Stefan Behte (RETIRED) gentoo-dev Security 2009-06-30 18:12:38 UTC
GLSA 200906-05, thanks everyone