SB2011030305 - Multiple vulnerabilities in Wireshark



SB2011030305 - Multiple vulnerabilities in Wireshark

Published: March 3, 2011 Updated: March 24, 2022

Security Bulletin ID SB2011030305
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2011-1138)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Off-by-one error in the dissect_6lowpan_iphc function in packet-6lowpan.c in Wireshark 1.4.0 through 1.4.3 on 32-bit platforms allows remote attackers to cause a denial of service (application crash) via a malformed 6LoWPAN IPv6 packet.


2) Resource management error (CVE-ID: CVE-2011-1139)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field.


3) Resource management error (CVE-ID: CVE-2011-1140)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.


4) Resource management error (CVE-ID: CVE-2011-1141)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

epan/dissectors/packet-ldap.c in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (memory consumption) via (1) a long LDAP filter string or (2) an LDAP filter string containing many elements.


5) Heap-based buffer overflow (CVE-ID: CVE-2011-0713)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3. A remote attacker can use a long record in a Nokia DCT3 trace file. to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.

References