wireshark-1.0.15-5.0.1.AXS3

エラータID: AXSA:2013-33:01

Release date: 
Monday, January 21, 2013 - 13:21
Subject: 
wireshark-1.0.15-5.0.1.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

Wireshark is a network traffic analyzer for Unix-ish operating systems.

This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package.

Security issues fixed with this release:

• CVE-2011-1958
Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.

• CVE-2011-1959
The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read.

• CVE-2011-2175
Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read.

• CVE-2011-2698
Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet.

• CVE-2011-4102
Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (application crash) via a malformed file.

• CVE-2012-0041
The dissect_packet function in epan/packet.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a capture file, as demonstrated by an airopeek file.

• CVE-2012-0042
Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string conversions, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet, related to epan/to_str.c.

• CVE-2012-0066
Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a (1) Accellent 5Views (aka .5vw) file, (2) I4B trace file, or (3) NETMON 2 capture file.

• CVE-2012-0067
wiretap/iptrace.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in an AIX iptrace file.

• CVE-2012-4285
The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.

• CVE-2012-4289
epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.

• CVE-2012-4290 The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.

• CVE-2012-4291 The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.

Fixed bugs:

• Fixed the parsing of link-local IPv6 addresses and Wireshark can prepare capture filter to omit SSH packets over a link-local IPv6 connection.

• Wireshark's column editing does not brak column names any longer.

• TShark now properly analyzes the exit code of Dumpcap and propagates it correctly.

• The TShark "-s" (snapshot length) has been fixed: it now works fine with sizes lower that 68 bytes.

Enhancement:

• Added support for the "NetDump" protocol was added.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. wireshark-1.0.15-5.0.1.AXS3.src.rpm
    MD5: 635ab53588edac0f008d3a211b7394f5
    SHA-256: 9b5f5bab3b24837145d4e59780eee915bc09651256fc874ceeef8bab145b8d1d
    Size: 12.83 MB

Asianux Server 3 for x86
  1. wireshark-1.0.15-5.0.1.AXS3.i386.rpm
    MD5: 27d59a64c23e8a1e28d00de05848a961
    SHA-256: a2a9b796018d5830cb44575633a91dca213e410eaa8a19819b4a438744a79d8f
    Size: 10.70 MB
  2. wireshark-gnome-1.0.15-5.0.1.AXS3.i386.rpm
    MD5: 44c5d74472f7df6f541a8397f0a40d02
    SHA-256: 1547146c8201489a6a9182c719e9cf3b409f83824bc79f626959833360c1558e
    Size: 672.36 kB

Asianux Server 3 for x86_64
  1. wireshark-1.0.15-5.0.1.AXS3.x86_64.rpm
    MD5: eedb0d8ef7d3cfcf358bcd44399c4116
    SHA-256: c47090692c09c3b4164492dc041e3a7ee880bc32be5327b557c17106ef01acbe
    Size: 12.00 MB
  2. wireshark-gnome-1.0.15-5.0.1.AXS3.x86_64.rpm
    MD5: c034d9dda875f4c7a7691ad3141a327b
    SHA-256: ea25b09f49ab5ae774266aefdad20282c6b9f84f9f4a8bbdfb55ab13b4eb32f3
    Size: 698.95 kB