SB2011060605 - Multiple vulnerabilities in Wireshark
Published: June 6, 2011 Updated: March 24, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Resource management error (CVE-ID: CVE-2011-1957)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length.
2) Input validation error (CVE-ID: CVE-2011-1958)
The vulnerability allows user-assisted remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.
3) Stack-based buffer overflow (CVE-ID: CVE-2011-1959)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the snoop_read function in wiretap/snoop.c when processing a large length value in a snoop file that triggers a stack-based buffer over-read. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Resource management error (CVE-ID: CVE-2011-2174)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression.
5) Out-of-bounds read (CVE-ID: CVE-2011-2175)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7. A remote attacker can perform a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read.
Remediation
Install update from vendor's website.
References
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=36958
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html
- http://openwall.com/lists/oss-security/2011/05/31/20
- http://openwall.com/lists/oss-security/2011/06/01/1
- http://openwall.com/lists/oss-security/2011/06/01/11
- http://secunia.com/advisories/44449
- http://secunia.com/advisories/44958
- http://secunia.com/advisories/45149
- http://secunia.com/advisories/48947
- http://www.debian.org/security/2011/dsa-2274
- http://www.securityfocus.com/bid/48066
- http://www.wireshark.org/security/wnpa-sec-2011-07.html
- http://www.wireshark.org/security/wnpa-sec-2011-08.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5876
- https://bugzilla.redhat.com/show_bug.cgi?id=710021
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67790
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14325
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- https://bugzilla.redhat.com/show_bug.cgi?id=710184
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67791
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15045
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=37068
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5912
- https://bugzilla.redhat.com/show_bug.cgi?id=710039
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67792
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14656
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=37081
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5908
- https://bugzilla.redhat.com/show_bug.cgi?id=710097
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67793
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14777
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=37128
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5934
- https://bugzilla.redhat.com/show_bug.cgi?id=710109
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14645