wireshark-3.4.10-6.el9
エラータID: AXSA:2023-6852:02
The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.
Security Fix(es):
* wireshark: RTPS dissector crash (CVE-2023-0666)
* wireshark: IEEE C37.118 Synchrophasor dissector crash (CVE-2023-0668)
* wireshark: Candump log file parser crash (CVE-2023-2855)
* wireshark: VMS TCPIPtrace file parser crash (CVE-2023-2856)
* wireshark: NetScaler file parser crash (CVE-2023-2858)
* wireshark: XRA dissector infinite loop (CVE-2023-2952)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2023-0666
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
CVE-2023-0668
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
CVE-2023-2855
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
CVE-2023-2856
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
CVE-2023-2858
NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
CVE-2023-2952
XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
Update packages.
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
N/A
SRPMS
- wireshark-3.4.10-6.el9.src.rpm
MD5: 45192e0d24ed890069291d3bf8803b60
SHA-256: 50ed88e1f810b14336000fbe0a190ec793dc8425e201635a94a5b433694ebe93
Size: 30.90 MB
Asianux Server 9 for x86_64
- wireshark-3.4.10-6.el9.x86_64.rpm
MD5: 2cf11cae979e2ef463b97cf35d35f37e
SHA-256: d2a7e9e9a34df861cbf9f162c2acb87a59215b40fd2b7b325d8100648924d331
Size: 3.85 MB - wireshark-cli-3.4.10-6.el9.i686.rpm
MD5: 957f62812540a4ec9779df15fdfc91a1
SHA-256: bbccdd5e3c01cc7583bdd17cbfe0e4c0e30a475e7d6b54105f6ca8278aed5781
Size: 17.98 MB - wireshark-cli-3.4.10-6.el9.x86_64.rpm
MD5: abeb4a0f73a2739ba90f037757e7f588
SHA-256: ee4e63140481fcf7cc15be2a685ca1581f58d83bf988100b61861fbbe2da68e4
Size: 20.32 MB - wireshark-devel-3.4.10-6.el9.i686.rpm
MD5: 3bcf685f164c4659ca63f2751403705a
SHA-256: 37d3e0e65e9be2354bfec590431b035924f0f43d791a8838cf584a30567f2d06
Size: 1.20 MB - wireshark-devel-3.4.10-6.el9.x86_64.rpm
MD5: 51ca3a50f1832d03259475046c8623d6
SHA-256: 30a20626e1167e2d3325461508cfdba9a65b4c160c0c5578898a5c4d1fa3ca37
Size: 1.20 MB