From $URL: Description Wireshark 1.4.5 fixes the following vulnerabilities: * The NFS dissector could crash on Windows. (Bug 5209) Versions affected: 1.4.0 to 1.4.4. * The X.509if dissector could crash. (Bug 5754, Bug 5793) Versions affected: 1.2.0 to 1.2.15 and 1.4.0 to 1.4.4. * Paul Makowski from SEI/CERT discovered that the DECT dissector could overflow a buffer. He verified that this could allow remote code execution on many platforms. Versions affected: 1.4.0 to 1.4.4.
New version is in the tree. Arch teams, please, stabilize.
x86 stable
Arch teams, please test and mark stable: =net-analyzer/wireshark-1.4.5 Target KEYWORDS="alpha amd64 hppa ia64 ppc ppc64 sparc x86"
Created attachment 270399 [details] Screenshot Works for me but when i start the program i see this error..anyone can confirm? Open separate bug? http://img828.imageshack.us/i/wire.png/
seeing also: amd64box ~ # wireshark [Errno 2] No such file or directory: '/usr/lib64/wireshark/python/1.4.5/wspy_dissectors' but there is a similar(by name) file: amd64box ~ # find /usr/lib64/ -iname "wspy_d*" /usr/lib64/wireshark/python/1.4.5/wspy_dissector.py
(In reply to comment #5) > seeing also: > > amd64box ~ # wireshark > [Errno 2] No such file or directory: > '/usr/lib64/wireshark/python/1.4.5/wspy_dissectors' > > but there is a similar(by name) file: > > > amd64box ~ # find /usr/lib64/ -iname "wspy_d*" > /usr/lib64/wireshark/python/1.4.5/wspy_dissector.py $ ssh -Y elmer wireshark [Errno 2] No such file or directory: '/usr/lib/wireshark/python/1.4.5/wspy_dissectors' Works fine otherwise. Stable for HPPA.
Adding CVE assignment per: http://www.openwall.com/lists/oss-security/2011/04/18/8 > > 1. Use of un-initialised variables: > > https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5793 > > https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5754 > > Patch: > > http://anonsvn.wireshark.org/viewvc?revision=36608&view=revision > > Versions affected: 1.2.0 to 1.2.15 and 1.4.0 to 1.4.4 Please use CVE-2011-1590 > > > > 2. Buffer overflow in DECT dissector > > The advisory does not list the bug number or the relevant patch. Please use CVE-2011-1591 > > > > 3. Crash in NFS dissector > > https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5209 > > Versions affected: 1.4.0 to 1.4.4. > > This affects Windows only. > > > > http://www.wireshark.org/security/wnpa-sec-2011-05.html > > http://www.wireshark.org/security/wnpa-sec-2011-06.html > > Please use CVE-2011-1592
(In reply to comment #4) > Works for me but when i start the program i see this error..anyone can confirm? > Open separate bug? What USE flags do you use? I'm unable to reproduce this problem. > amd64box ~ # wireshark > [Errno 2] No such file or directory: > '/usr/lib64/wireshark/python/1.4.5/wspy_dissectors' I'll check this error as I see it too. @arch teams, there is new release that fixes important regression. I'll bump it shortly, but until then I'll remove you from CC.
[ebuild R ] net-analyzer/wireshark-1.4.5 USE="ares caps doc gcrypt geoip gtk ipv6 lua pcap pcre portaudio profile python smi ssl threads zlib -adns -doc-pdf -kerberos (-selinux)" 0 kB
=net-analyzer/wireshark-1.4.6 is in the tree.
Stabilizing all arches on 1.4.6 (the regression bug looks like it may be worthy of a CVE). Arches, please test and mark stable: =net-analyzer/wireshark-1.4.6 Target keywords : "alpha amd64 hppa ia64 ppc ppc64 sparc x86"
Jeroen, you are a bit fast and I had hard week :) Agostino, I'm still unable to reproduce lua error (lua works here), so if you are, please, open new bug. python warning is fixed. That said, arch teams, please, stabilize 1.4.6-r1.
(In reply to comment #12) > Agostino, I'm still unable to reproduce lua error (lua works here), so if you > are, please, open new bug. python warning is fixed. ok, i'll do a new bug, the problem still exist atm > That said, arch teams, please, stabilize 1.4.6-r1. works on amd64
(In reply to comment #13) > works on amd64 look also at Bug 365295
I tested the -r1 version on x86 and everything looks good here! Bug 365295 didn't happened here and i don't see any wspy_dissectors" message upon startup.
Stable for HPPA.
amd64 done. Thanks Agostino
x86 stable. Thanks Andreas
ppc/ppc64 stable
Stable on alpha.
ia64/sparc stable
Thanks, everyone. Added to existing GLSA request.
CVE-2011-1592 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1592): The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file. CVE-2011-1591 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1591): Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file. CVE-2011-1590 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1590): The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
CVE-2011-1956 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1956): The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic.
This issue was resolved and addressed in GLSA 201110-02 at http://security.gentoo.org/glsa/glsa-201110-02.xml by GLSA coordinator Alex Legler (a3li).