oss-sec mailing list archives

Re: CVE Request: Multiple wireshark security flaws resolved in 1.4.12 and 1.6.6


From: Kurt Seifried <kseifried () redhat com>
Date: Wed, 28 Mar 2012 09:05:18 -0600

On 03/28/2012 02:56 AM, Huzaifa Sidhpurwala wrote:
Hi Folks,

Multiple security flaws were resolved in the recent release
of version 1.4.12 and 1.6.6. Details as follows, can CVE ids
be please assigned to them?

1. Null pointer dereference in ANSI A dissector:
The ANSI A dissector could dereference a NULL pointer and crash.
It may be possible to make Wireshark crash by injecting a malformed
packet onto the wire or by convincing someone to read a malformed
packet trace file.

Reference:
http://www.wireshark.org/security/wnpa-sec-2012-04.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6823
Patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=40962

Please use CVE-2012-1593 for this issue.

2. Dos/Infinite loop when in IEEE 802.11 dissector:
The IEEE 802.11 dissector could go into an infinite loop.
It may be possible to make Wireshark crash by injecting a malformed
packet onto the wire or by convincing someone to read a malformed
packet trace file.

Reference:
http://www.wireshark.org/security/wnpa-sec-2012-05.html
http://www.wireshark.org/security/wnpa-sec-2012-05.html
Patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=40967

Please use CVE-2012-1594 for this issue.

3. Memory corruption when processing pcap/pcap-ng file formats:
The pcap and pcap-ng file parsers could crash trying to read ERF data.
It may be possible to make Wireshark crash convincing someone to read a
malformed packet trace file.

Reference:
http://www.wireshark.org/security/wnpa-sec-2012-06.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6804
Patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=41056

Please use CVE-2012-1595 for this issue.

4. Wireshark MP2T memory allocation flaw
The MP2T dissector could try to allocate too much memory and crash.
It may be possible to make Wireshark crash by injecting a malformed
packet onto the wire or by convincing someone to read a malformed
packet trace file.

Reference:
http://www.wireshark.org/security/wnpa-sec-2012-07.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6833
Possible Patch:
http://anonsvn.wireshark.org/viewvc?view=revision&revision=40978 (not sure)

Please use CVE-2012-1596 for this issue.

@Gerald,
All your new advisory links on the wireshark security page are pointing
to the same page, so you may want to correct that :)




-- 
Kurt Seifried Red Hat Security Response Team (SRT)


Current thread: