SB2013073011 - Multiple vulnerabilities in Wireshark
Published: July 30, 2013 Updated: March 24, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2013-4936)
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
2) Input validation error (CVE-ID: CVE-2013-4921)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Off-by-one error in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
3) Resource management error (CVE-ID: CVE-2013-4922)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Double free vulnerability in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
4) Memory leak (CVE-ID: CVE-2013-4923)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (memory consumption) via crafted packets. A remote attacker can perform a denial of service attack.
5) Input validation error (CVE-ID: CVE-2013-4924)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly validate certain index values, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
6) Input validation error (CVE-ID: CVE-2013-4925)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Integer signedness error in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted packet.
7) Input validation error (CVE-ID: CVE-2013-4926)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
8) Input validation error (CVE-ID: CVE-2013-4928)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Integer signedness error in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
9) Buffer overflow (CVE-ID: CVE-2013-4920)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The P1 dissector in Wireshark 1.10.x before 1.10.1 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Remediation
Install update from vendor's website.
References
- http://anonsvn.wireshark.org/viewvc/trunk/plugins/profinet/packet-pn-rt.c?r1=50651&r2=50650&pathrev=50651
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=50651
- http://secunia.com/advisories/54296
- http://secunia.com/advisories/54425
- http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
- http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8904
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16971
- https://www.wireshark.org/security/wnpa-sec-2013-53.html
- http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ieee80211-radiotap.c?r1=50090&r2=50089&pathrev=50090
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=50090
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8830
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17514
- https://www.wireshark.org/security/wnpa-sec-2013-43.html
- http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094&r2=50093&pathrev=50094
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=50094
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17456
- https://www.wireshark.org/security/wnpa-sec-2013-44.html
- http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094&r2=50093&pathrev=50094
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=50094
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16731
- http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50432&r2=50431&pathrev=50432
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=50432
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17701
- http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478&r2=50477&pathrev=50478
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=50478
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17585
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17547
- http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-btobex.c?r1=50258&r2=50257&pathrev=50258
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=50258
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8875
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17540
- https://www.wireshark.org/security/wnpa-sec-2013-46.html
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=50083
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8826
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17089
- https://www.wireshark.org/security/wnpa-sec-2013-42.html