Summary: | <net-analyzer/wireshark-{1.6.10,1.8.2} - multiple vulnerabilities (CVE-2012-{4285,4286,4287,4288,4289,4290,4291,4292,4293,4294,4295,4296,4297,4298}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jeroen Roovers (RETIRED) <jer> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | netmon, pva, zerochaos |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.wireshark.org/docs/relnotes/wireshark-1.8.2.html | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 433990 | ||
Bug Blocks: | 427964 |
Description
Jeroen Roovers (RETIRED)
![]() For <1.6.10 the list is shorter: CVE-2012-4285 CVE-2012-4288 CVE-2012-4289 CVE-2012-4296 CVE-2012-4297 CVE-2012-4291 CVE-2012-4292 CVE-2012-4293 CVE-2012-4290 Bumping... Arch teams, please test and mark stable: =net-analyzer/wireshark-1.6.10 =net-analyzer/wireshark-1.8.2 Stable KEYWORDS : alpha amd64 hppa ia64 ppc ppc64 sparc x86 CVE-2012-4298 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4298): Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to execute arbitrary code via a crafted packet-trace file that triggers a buffer overflow. CVE-2012-4297 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4297): Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x before 1.6.10 and 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a malformed packet. CVE-2012-4296 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4296): Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet. CVE-2012-4295 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4295): Array index error in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 might allow remote attackers to cause a denial of service (application crash) via a crafted speed (aka rate) value. CVE-2012-4294 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4294): Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value. CVE-2012-4293 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4293): plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly handle certain integer fields, which allows remote attackers to cause a denial of service (application exit) via a malformed packet. CVE-2012-4292 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4292): The dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly interact with key-destruction behavior in a certain tree library, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. CVE-2012-4291 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4291): The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet. CVE-2012-4290 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4290): The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet. CVE-2012-4289 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4289): epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries. CVE-2012-4288 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4288): Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length. CVE-2012-4287 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4287): epan/dissectors/packet-mongo.c in the MongoDB dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a small value for a BSON document length. CVE-2012-4286 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4286): The pcapng_read_packet_block function in wiretap/pcapng.c in the pcap-ng file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted pcap-ng file. CVE-2012-4285 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4285): The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message. Stable for HPPA. x86 done. amd64 stable alpha/ia64/sparc stable Continued in bug #433990. (In reply to comment #9) > Continued in bug #433990. Until an updated ebuild fixing bug #433990 is provided for stabilization, PPC/PPC64 should continue here. Returning to bug #433990 This issue was resolved and addressed in GLSA 201308-05 at http://security.gentoo.org/glsa/glsa-201308-05.xml by GLSA coordinator Sergey Popov (pinkbyte). |