wireshark-1.8.10-8.AXS4

エラータID: AXSA:2014-616:03

Release date: 
Wednesday, October 22, 2014 - 15:36
Subject: 
wireshark-1.8.10-8.AXS4
Affected Channels: 
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity: 
Moderate
Description: 

Description :
Wireshark is a network traffic analyzer for Unix-ish operating systems.

This package lays base for libpcap, a packet capture and filtering
library, contains command-line utilities, contains plugins and
documentation for wireshark. A graphical user interface is packaged
separately to GTK+ package.

Security issues fixed with this release:
CVE-2014-6421
Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.

CVE-2014-6422
The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.

CVE-2014-6423
The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.

CVE-2014-6424
The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.

CVE-2014-6425
The (1) get_quoted_string and (2) get_unquoted_string functions in epan/dissectors/packet-cups.c in the CUPS dissector in Wireshark 1.12.x before 1.12.1 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a CUPS packet that lacks a trailing '\0' character.

CVE-2014-6426
The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

CVE-2014-6427
Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.

CVE-2014-6428
The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

CVE-2014-6429
The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.

CVE-2014-6430
The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.

CVE-2014-6431
Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.

CVE-2014-6432
The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.

Solution: 

Update package.

Additional Info: 

N/A

Download: 

SRPMS
  1. wireshark-1.8.10-8.AXS4.src.rpm
    MD5: 7296a123582e6f77d26f548c49924646
    SHA-256: ce9bb2ab6665882d4c4dec897b789394dbedeffec99b3fb401f046bfc63bbc82
    Size: 23.02 MB

Asianux Server 4 for x86
  1. wireshark-1.8.10-8.AXS4.i686.rpm
    MD5: 6cf5c2f9173ea127849adb5fc1338c33
    SHA-256: f714cc1f2f4a2cced9b9208f0f6940b8aa23a6d749091469b8357b076885b285
    Size: 9.95 MB
  2. wireshark-gnome-1.8.10-8.AXS4.i686.rpm
    MD5: 5362ba0920a273890383e908584cb68e
    SHA-256: dbd62f6cf9ff9374d0b01febff66ddaaf3e3bcc3fe85e92ee403e2dc755a0127
    Size: 842.35 kB

Asianux Server 4 for x86_64
  1. wireshark-1.8.10-8.AXS4.x86_64.rpm
    MD5: 49a4c43d0fd8f8db93a9bdb53a0fb4be
    SHA-256: 95418ba3b2eed967f1e619479c987f2c8f8d648d7d4603198f90c68fb9d60598
    Size: 11.40 MB
  2. wireshark-gnome-1.8.10-8.AXS4.x86_64.rpm
    MD5: e8f7cafe48d5d281cb61f68afaffc34c
    SHA-256: 301e2c3ca71e0a51fc0bf5dc979946e512aba9012c8ad193029d238068e5142c
    Size: 854.64 kB
  3. wireshark-1.8.10-8.AXS4.i686.rpm
    MD5: 6cf5c2f9173ea127849adb5fc1338c33
    SHA-256: f714cc1f2f4a2cced9b9208f0f6940b8aa23a6d749091469b8357b076885b285
    Size: 9.95 MB