wireshark-3.4.10-6.el9

エラータID: AXSA:2023-6852:02

Release date: 
Monday, December 11, 2023 - 06:52
Subject: 
wireshark-3.4.10-6.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.

Security Fix(es):

* wireshark: RTPS dissector crash (CVE-2023-0666)
* wireshark: IEEE C37.118 Synchrophasor dissector crash (CVE-2023-0668)
* wireshark: Candump log file parser crash (CVE-2023-2855)
* wireshark: VMS TCPIPtrace file parser crash (CVE-2023-2856)
* wireshark: NetScaler file parser crash (CVE-2023-2858)
* wireshark: XRA dissector infinite loop (CVE-2023-2952)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-0666
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
CVE-2023-0668
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
CVE-2023-2855
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
CVE-2023-2856
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
CVE-2023-2858
NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
CVE-2023-2952
XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. wireshark-3.4.10-6.el9.src.rpm
    MD5: 45192e0d24ed890069291d3bf8803b60
    SHA-256: 50ed88e1f810b14336000fbe0a190ec793dc8425e201635a94a5b433694ebe93
    Size: 30.90 MB

Asianux Server 9 for x86_64
  1. wireshark-3.4.10-6.el9.x86_64.rpm
    MD5: 2cf11cae979e2ef463b97cf35d35f37e
    SHA-256: d2a7e9e9a34df861cbf9f162c2acb87a59215b40fd2b7b325d8100648924d331
    Size: 3.85 MB
  2. wireshark-cli-3.4.10-6.el9.i686.rpm
    MD5: 957f62812540a4ec9779df15fdfc91a1
    SHA-256: bbccdd5e3c01cc7583bdd17cbfe0e4c0e30a475e7d6b54105f6ca8278aed5781
    Size: 17.98 MB
  3. wireshark-cli-3.4.10-6.el9.x86_64.rpm
    MD5: abeb4a0f73a2739ba90f037757e7f588
    SHA-256: ee4e63140481fcf7cc15be2a685ca1581f58d83bf988100b61861fbbe2da68e4
    Size: 20.32 MB
  4. wireshark-devel-3.4.10-6.el9.i686.rpm
    MD5: 3bcf685f164c4659ca63f2751403705a
    SHA-256: 37d3e0e65e9be2354bfec590431b035924f0f43d791a8838cf584a30567f2d06
    Size: 1.20 MB
  5. wireshark-devel-3.4.10-6.el9.x86_64.rpm
    MD5: 51ca3a50f1832d03259475046c8623d6
    SHA-256: 30a20626e1167e2d3325461508cfdba9a65b4c160c0c5578898a5c4d1fa3ca37
    Size: 1.20 MB