Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 363895 (CVE-2011-1590) - <net-analyzer/wireshark-1.4.6: DoS and Remote Code Execution Vulnerabilities (CVE-2011-{1590,1591,1592,1956})
Summary: <net-analyzer/wireshark-1.4.6: DoS and Remote Code Execution Vulnerabilities ...
Status: RESOLVED FIXED
Alias: CVE-2011-1590
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: http://www.wireshark.org/security/wnp...
Whiteboard: A2 [glsa]
Keywords:
Depends on: 364267
Blocks:
  Show dependency tree
 
Reported: 2011-04-16 22:34 UTC by Tim Sammut (RETIRED)
Modified: 2011-10-09 20:02 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
Screenshot (wire.png,14.92 KB, image/png)
2011-04-18 15:51 UTC, Agostino Sarubbo
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Tim Sammut (RETIRED) gentoo-dev 2011-04-16 22:34:02 UTC
From $URL:

Description

Wireshark 1.4.5 fixes the following vulnerabilities:

    * The NFS dissector could crash on Windows. (Bug 5209) Versions affected: 1.4.0 to 1.4.4.
    * The X.509if dissector could crash. (Bug 5754, Bug 5793) Versions affected: 1.2.0 to 1.2.15 and 1.4.0 to 1.4.4.
    * Paul Makowski from SEI/CERT discovered that the DECT dissector could overflow a buffer. He verified that this could allow remote code execution on many platforms. Versions affected: 1.4.0 to 1.4.4.
Comment 1 Peter Volkov (RETIRED) gentoo-dev 2011-04-17 13:17:49 UTC
New version is in the tree. Arch teams, please, stabilize.
Comment 2 Christian Faulhammer (RETIRED) gentoo-dev 2011-04-17 18:12:50 UTC
x86 stable
Comment 3 Jeroen Roovers (RETIRED) gentoo-dev 2011-04-18 03:55:08 UTC
Arch teams, please test and mark stable:
=net-analyzer/wireshark-1.4.5
Target KEYWORDS="alpha amd64 hppa ia64 ppc ppc64 sparc x86"
Comment 4 Agostino Sarubbo gentoo-dev 2011-04-18 15:51:04 UTC
Created attachment 270399 [details]
Screenshot

Works for me but when i start the program i see this error..anyone can confirm?
Open separate bug?

http://img828.imageshack.us/i/wire.png/
Comment 5 Agostino Sarubbo gentoo-dev 2011-04-18 15:57:23 UTC
seeing also:

amd64box ~ # wireshark 
[Errno 2] No such file or directory: '/usr/lib64/wireshark/python/1.4.5/wspy_dissectors'

but there is a similar(by name) file:


amd64box ~ # find /usr/lib64/ -iname "wspy_d*"
/usr/lib64/wireshark/python/1.4.5/wspy_dissector.py
Comment 6 Jeroen Roovers (RETIRED) gentoo-dev 2011-04-18 18:28:24 UTC
(In reply to comment #5)
> seeing also:
> 
> amd64box ~ # wireshark 
> [Errno 2] No such file or directory:
> '/usr/lib64/wireshark/python/1.4.5/wspy_dissectors'
> 
> but there is a similar(by name) file:
> 
> 
> amd64box ~ # find /usr/lib64/ -iname "wspy_d*"
> /usr/lib64/wireshark/python/1.4.5/wspy_dissector.py

$ ssh -Y elmer wireshark
[Errno 2] No such file or directory: '/usr/lib/wireshark/python/1.4.5/wspy_dissectors'

Works fine otherwise. Stable for HPPA.
Comment 7 Tim Sammut (RETIRED) gentoo-dev 2011-04-20 02:40:57 UTC
Adding CVE assignment per: http://www.openwall.com/lists/oss-security/2011/04/18/8

> > 1. Use of un-initialised variables:
> > https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5793
> > https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5754
> > Patch:
> > http://anonsvn.wireshark.org/viewvc?revision=36608&view=revision
> > Versions affected: 1.2.0 to 1.2.15 and 1.4.0 to 1.4.4
Please use CVE-2011-1590

> > 
> > 2. Buffer overflow in DECT dissector
> > The advisory does not list the bug number or the relevant patch.
Please use CVE-2011-1591

> > 
> > 3. Crash in NFS dissector
> > https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5209
> > Versions affected: 1.4.0 to 1.4.4.
> > This affects Windows only.
> > 
> > http://www.wireshark.org/security/wnpa-sec-2011-05.html
> > http://www.wireshark.org/security/wnpa-sec-2011-06.html
> > 
Please use CVE-2011-1592
Comment 8 Peter Volkov (RETIRED) gentoo-dev 2011-04-20 03:58:46 UTC
(In reply to comment #4)
> Works for me but when i start the program i see this error..anyone can confirm?
> Open separate bug?

What USE flags do you use? I'm unable to reproduce this problem.

> amd64box ~ # wireshark 
> [Errno 2] No such file or directory:
> '/usr/lib64/wireshark/python/1.4.5/wspy_dissectors'

I'll check this error as I see it too.

@arch teams, there is new release that fixes important regression. I'll bump it shortly, but until then I'll remove you from CC.
Comment 9 Agostino Sarubbo gentoo-dev 2011-04-20 09:28:24 UTC
[ebuild   R   ] net-analyzer/wireshark-1.4.5  USE="ares caps doc gcrypt geoip gtk ipv6 lua pcap pcre portaudio profile python smi ssl threads zlib -adns -doc-pdf -kerberos (-selinux)" 0 kB
Comment 10 Jeroen Roovers (RETIRED) gentoo-dev 2011-04-29 03:17:50 UTC
=net-analyzer/wireshark-1.4.6 is in the tree.
Comment 11 Tim Sammut (RETIRED) gentoo-dev 2011-04-29 03:40:27 UTC
Stabilizing all arches on 1.4.6 (the regression bug looks like it may be worthy of a CVE).

Arches, please test and mark stable:
=net-analyzer/wireshark-1.4.6
Target keywords : "alpha amd64 hppa ia64 ppc ppc64 sparc x86"
Comment 12 Peter Volkov (RETIRED) gentoo-dev 2011-04-29 09:52:09 UTC
Jeroen, you are a bit fast and I had hard week :)
 
Agostino, I'm still unable to reproduce lua error (lua works here), so if you are, please, open new bug. python warning is fixed.

That said, arch teams, please, stabilize 1.4.6-r1.
Comment 13 Agostino Sarubbo gentoo-dev 2011-04-29 10:39:50 UTC
(In reply to comment #12)
> Agostino, I'm still unable to reproduce lua error (lua works here), so if you
> are, please, open new bug. python warning is fixed.
ok, i'll do a new bug, the problem still exist atm
 
> That said, arch teams, please, stabilize 1.4.6-r1.

works on amd64
Comment 14 Agostino Sarubbo gentoo-dev 2011-04-29 11:06:39 UTC
(In reply to comment #13)
> works on amd64

look also at Bug 365295
Comment 15 Andreas Schürch gentoo-dev 2011-04-29 12:49:19 UTC
I tested the -r1 version on x86 and everything looks good here! 
Bug 365295 didn't happened here and i don't see any wspy_dissectors" message upon startup.
Comment 16 Jeroen Roovers (RETIRED) gentoo-dev 2011-04-29 17:15:21 UTC
Stable for HPPA.
Comment 17 Markos Chandras (RETIRED) gentoo-dev 2011-04-29 21:04:08 UTC
amd64 done. Thanks Agostino
Comment 18 Thomas Kahle (RETIRED) gentoo-dev 2011-05-01 08:07:06 UTC
x86 stable. Thanks Andreas
Comment 19 Kacper Kowalik (Xarthisius) (RETIRED) gentoo-dev 2011-05-01 08:22:02 UTC
ppc/ppc64 stable
Comment 20 Tobias Klausmann (RETIRED) gentoo-dev 2011-05-02 15:00:27 UTC
Stable on alpha.
Comment 21 Raúl Porcel (RETIRED) gentoo-dev 2011-05-07 16:41:17 UTC
ia64/sparc stable
Comment 22 Tim Sammut (RETIRED) gentoo-dev 2011-05-08 14:10:58 UTC
Thanks, everyone. Added to existing GLSA request.
Comment 23 GLSAMaker/CVETool Bot gentoo-dev 2011-06-14 09:10:40 UTC
CVE-2011-1592 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1592):
  The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before
  1.4.5 on Windows uses an incorrect integer data type during decoding of
  SETCLIENTID calls, which allows remote attackers to cause a denial of
  service (application crash) via a crafted .pcap file.

CVE-2011-1591 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1591):
  Stack-based buffer overflow in the DECT dissector in
  epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote
  attackers to execute arbitrary code via a crafted .pcap file.

CVE-2011-1590 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1590):
  The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before
  1.4.5 does not properly initialize certain global variables, which allows
  remote attackers to cause a denial of service (application crash) via a
  crafted .pcap file.
Comment 24 GLSAMaker/CVETool Bot gentoo-dev 2011-06-25 12:20:37 UTC
CVE-2011-1956 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1956):
  The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer
  argument, which allows remote attackers to cause a denial of service (NULL
  pointer dereference and application crash) via arbitrary TCP traffic.
Comment 25 GLSAMaker/CVETool Bot gentoo-dev 2011-10-09 20:01:10 UTC
This issue was resolved and addressed in
 GLSA 201110-02 at http://security.gentoo.org/glsa/glsa-201110-02.xml
by GLSA coordinator Alex Legler (a3li).
Comment 26 GLSAMaker/CVETool Bot gentoo-dev 2011-10-09 20:02:04 UTC
This issue was resolved and addressed in
 GLSA 201110-02 at http://security.gentoo.org/glsa/glsa-201110-02.xml
by GLSA coordinator Alex Legler (a3li).