Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2016:0660-1

Опубликовано: 05 мар. 2016
Источник: suse-cvrf

Описание

Security update for wireshark

Wireshark was updated to 1.12.10, fixing a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file, specifically:

  • CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03)
  • CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10)
  • CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10)
  • CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11)
  • GSM A-bis OML dissector crash (wnpa-sec-2016-14)
  • ASN.1 BER dissector crash (wnpa-sec-2016-15)
  • ASN.1 BER dissector crash (wnpa-sec-2016-18)

Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html

The following non-security bugs were fixed:

  • boo#961170: Recommend wireshark-ui instead of requiring it to support text-only used

Список пакетов

openSUSE Leap 42.1
wireshark-1.12.10-17.1
wireshark-devel-1.12.10-17.1
wireshark-ui-gtk-1.12.10-17.1
wireshark-ui-qt-1.12.10-17.1

Описание

The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.


Затронутые продукты
openSUSE Leap 42.1:wireshark-1.12.10-17.1
openSUSE Leap 42.1:wireshark-devel-1.12.10-17.1
openSUSE Leap 42.1:wireshark-ui-gtk-1.12.10-17.1
openSUSE Leap 42.1:wireshark-ui-qt-1.12.10-17.1

Ссылки

Описание

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.


Затронутые продукты
openSUSE Leap 42.1:wireshark-1.12.10-17.1
openSUSE Leap 42.1:wireshark-devel-1.12.10-17.1
openSUSE Leap 42.1:wireshark-ui-gtk-1.12.10-17.1
openSUSE Leap 42.1:wireshark-ui-qt-1.12.10-17.1

Ссылки

Описание

Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.


Затронутые продукты
openSUSE Leap 42.1:wireshark-1.12.10-17.1
openSUSE Leap 42.1:wireshark-devel-1.12.10-17.1
openSUSE Leap 42.1:wireshark-ui-gtk-1.12.10-17.1
openSUSE Leap 42.1:wireshark-ui-qt-1.12.10-17.1

Ссылки

Описание

The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.


Затронутые продукты
openSUSE Leap 42.1:wireshark-1.12.10-17.1
openSUSE Leap 42.1:wireshark-devel-1.12.10-17.1
openSUSE Leap 42.1:wireshark-ui-gtk-1.12.10-17.1
openSUSE Leap 42.1:wireshark-ui-qt-1.12.10-17.1

Ссылки