Summary: | <net-analyzer/wireshark-1.12.4: Multiple vulnerabilities (CVE-2015-{2187,2188,2189,2190,2191,2192}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jeroen Roovers (RETIRED) <jer> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | netmon |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.wireshark.org/lists/wireshark-announce/201503/msg00001.html | ||
Whiteboard: | B3 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Jeroen Roovers (RETIRED)
2015-03-05 07:19:53 UTC
Arch teams, please test and mark stable: =net-analyzer/wireshark-1.12.4 Targeted stable KEYWORDS : alpha amd64 hppa ia64 ppc ppc64 sparc x86 Stable for HPPA. amd64 stable x86 stable ia64 stable ppc stable ppc64 stable sparc stable alpha stable. Maintainer(s), please cleanup. CVE-2015-2192 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2192): Integer overflow in the dissect_osd2_cdb_continuation function in epan/dissectors/packet-scsi-osd.c in the SCSI OSD dissector in Wireshark 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet. CVE-2015-2191 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2191): Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet. CVE-2015-2190 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2190): epan/proto.c in Wireshark 1.12.x before 1.12.4 does not properly handle integer data types greater than 32 bits in size, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet that is improperly handled by the LLDP dissector. CVE-2015-2189 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2189): Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet. CVE-2015-2188 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2188): epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression. CVE-2015-2187 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2187): The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial of service (stack memory corruption and application crash) via a crafted packet. Arches, Thank you for your work. GLSA Vote: Yes Maintainer(s), please drop the vulnerable version(s). (In reply to Yury German from comment #11) > Maintainer(s), please drop the vulnerable version(s). That happened on March 30. Sorry jer, not in the notes here and was looking at around 80 bugs today so did not check cve. Thank you for cleaning it up. GLSA Vote: Yes, new request filed This issue was resolved and addressed in GLSA 201510-03 at https://security.gentoo.org/glsa/201510-03 by GLSA coordinator Kristian Fiskerstrand (K_F). |