wireshark-1.10.14-7.el7
エラータID: AXSA:2015-660:01
Wireshark is a network traffic analyzer for Unix-ish operating systems.
This package lays base for libpcap, a packet capture and filtering
library, contains command-line utilities, contains plugins and
documentation for wireshark. A graphical user interface is packaged
separately to GTK package.
Security issues fixed with this release:
CVE-2014-8710
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the
SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows
remote attackers to cause a denial of service (buffer over-read and
application crash) via a crafted packet.
CVE-2014-8711
Multiple integer overflows in epan/dissectors/packet-amqp.c in the
AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before
1.12.2 allow remote attackers to cause a denial of service
(application crash) via a crafted amqp_0_10 PDU in a packet.
CVE-2014-8712
The build_expert_data function in epan/dissectors/packet-ncp2222.inc
in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x
before 1.12.2 does not properly initialize a data structure, which
allows remote attackers to cause a denial of service (application
crash) via a crafted packet.
CVE-2014-8713
Stack-based buffer overflow in the build_expert_data function in
epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark
1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers
to cause a denial of service (application crash) via a crafted packet.
CVE-2014-8714
The dissect_write_structured_field function in
epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark
1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers
to cause a denial of service (infinite loop) via a crafted packet.
CVE-2015-0562
Multiple use-after-free vulnerabilities in
epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol
dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3
allow remote attackers to cause a denial of service (application
crash) via a crafted packet, related to the use of packet-scope memory
instead of pinfo-scope memory.
CVE-2015-0563
epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark
1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect
length value for certain string-append operations, which allows remote
attackers to cause a denial of service (application crash) via a
crafted packet.
CVE-2015-0564
Buffer underflow in the ssl_decrypt_record function in
epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12
and 1.12.x before 1.12.3 allows remote attackers to cause a denial of
service (application crash) via a crafted packet that is improperly
handled during decryption of an SSL session.
CVE-2015-2188
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x
before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a
data structure, which allows remote attackers to cause a denial of
service (out-of-bounds read and application crash) via a crafted
packet that is improperly handled during decompression.
CVE-2015-2189
Off-by-one error in the pcapng_read function in wiretap/pcapng.c in
the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x
before 1.12.4 allows remote attackers to cause a denial of service
(out-of-bounds read and application crash) via an invalid Interface
Statistics Block (ISB) interface ID in a crafted packet.
CVE-2015-2191
Integer overflow in the dissect_tnef function in
epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark
1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers
to cause a denial of service (infinite loop) via a crafted length
field in a packet.
CVE-2015-3182
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-3810
epan/dissectors/packet-websocket.c in the WebSocket dissector in
Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which
allows remote attackers to cause a denial of service (CPU consumption)
via a crafted packet.
CVE-2015-3811
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x
before 1.10.14 and 1.12.x before 1.12.5 improperly refers to
previously processed bytes, which allows remote attackers to cause a
denial of service (application crash) via a crafted packet, a
different vulnerability than CVE-2015-2188.
CVE-2015-3812
Multiple memory leaks in the x11_init_protocol function in
epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x
before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to
cause a denial of service (memory consumption) via a crafted packet.
CVE-2015-3813
The fragment_add_work function in epan/reassemble.c in the
packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not
properly determine the defragmentation state in a case of an
insufficient snapshot length, which allows remote attackers to cause a
denial of service (memory consumption) via a crafted packet.
CVE-2015-6243
The dissector-table implementation in epan/packet.c in Wireshark
1.12.x before 1.12.7 mishandles table searches for empty strings,
which allows remote attackers to cause a denial of service
(application crash) via a crafted packet, related to the (1)
dissector_get_string_handle and (2)
dissector_get_default_string_handle functions.
CVE-2015-6244
The dissect_zbee_secure function in
epan/dissectors/packet-zbee-security.c in the ZigBee dissector in
Wireshark 1.12.x before 1.12.7 improperly relies on length fields
contained in packet data, which allows remote attackers to cause a
denial of service (application crash) via a crafted packet.
CVE-2015-6245
epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in
Wireshark 1.12.x before 1.12.7 uses incorrect integer data types,
which allows remote attackers to cause a denial of service (infinite
loop) via a crafted packet.
CVE-2015-6246
The dissect_wa_payload function in epan/dissectors/packet-waveagent.c
in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7
mishandles large tag values, which allows remote attackers to cause a
denial of service (application crash) via a crafted packet.
CVE-2015-6248
The ptvcursor_add function in the ptvcursor implementation in
epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether
the expected amount of data is available, which allows remote
attackers to cause a denial of service (application crash) via a
crafted packet.
Fixed bugs:
* Prior to this update, when using the tshark utility to capture packets over the interface, tshark failed to create output files in the .pcap format even if it was specified using the "-F" option. This bug has been fixed, the "-F" option is now honored, and the result saved in the .pcap format as expected.
Enhancements:
* Previously, wireshark included only microseconds in the .pcapng format. With this update, wireshark supports nanosecond time stamp precision to allow for more accurate time stamps.
Update packages.
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.
The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
epan/dissectors/packet-dec-dnart.c in the DECnet NSP/RT dissector in Wireshark 1.10.12 through 1.10.14 mishandles a certain strdup return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions.
The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
N/A
SRPMS
- wireshark-1.10.14-7.el7.src.rpm
MD5: d22fa8e117d375504b7c04794e77a21f
SHA-256: ca37f033a8697ae73c8f7279e054bbffe25b7fbaecdd560d1a3cb4a78b1ba215
Size: 25.71 MB
Asianux Server 7 for x86_64
- wireshark-1.10.14-7.el7.x86_64.rpm
MD5: 21968ae9775800a18ec5e3d39e99e3f7
SHA-256: 7217d181ce52526c178e5f2931e1934537bf44b826f884934d99190b8e9f895d
Size: 12.51 MB - wireshark-gnome-1.10.14-7.el7.x86_64.rpm
MD5: 337678196ad3743cd7e26aef3d231bb0
SHA-256: 280f39acebf3d775efd04ffa2dc0366e07bbf827b718ce33b881a968b3765bd4
Size: 907.81 kB - wireshark-1.10.14-7.el7.i686.rpm
MD5: 040a98198df1652ef178b231f5ddae27
SHA-256: fea1502159d87ffde8532490d119bd39d10068b0d45949d2f2a86734536c5f7b
Size: 10.82 MB