- Issued:
- 2014-03-31
- Updated:
- 2014-03-31
RHSA-2014:0341 - Security Advisory
Synopsis
Moderate: wireshark security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Description
Wireshark is a network protocol analyzer. It is used to capture and browse
the traffic running on a computer network.
Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash or,
possibly, execute arbitrary code as the user running Wireshark.
(CVE-2013-3559, CVE-2013-4083, CVE-2014-2281, CVE-2014-2299)
Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2012-5595, CVE-2012-5598, CVE-2012-5599,
CVE-2012-5600, CVE-2012-6056, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,
CVE-2013-3557, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931, CVE-2013-4932,
CVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-5721, CVE-2013-7112)
All Wireshark users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. All running instances
of Wireshark must be restarted for the update to take effect.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 881742 - CVE-2012-5600 CVE-2012-6062 wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)
- BZ - 881748 - CVE-2012-5599 CVE-2012-6061 wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)
- BZ - 881771 - CVE-2012-5598 CVE-2012-6060 wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)
- BZ - 881809 - CVE-2012-5595 CVE-2012-6056 wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)
- BZ - 965190 - CVE-2013-3559 wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)
- BZ - 965193 - CVE-2013-3557 wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)
- BZ - 972686 - CVE-2013-4081 wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)
- BZ - 972688 - CVE-2013-4083 wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)
- BZ - 990166 - CVE-2013-4927 wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)
- BZ - 990170 - CVE-2013-4931 wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)
- BZ - 990172 - CVE-2013-4932 wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)
- BZ - 990175 - CVE-2013-4933 wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)
- BZ - 990178 - CVE-2013-4934 wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)
- BZ - 990179 - CVE-2013-4935 wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)
- BZ - 1007197 - CVE-2013-5721 wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)
- BZ - 1044508 - CVE-2013-7112 wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)
- BZ - 1074109 - CVE-2014-2299 wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)
- BZ - 1074114 - CVE-2014-2281 wireshark: NFS dissector crash (wnpa-sec-2014-01)
CVEs
- CVE-2012-6056
- CVE-2013-4081
- CVE-2013-4083
- CVE-2013-5721
- CVE-2012-5599
- CVE-2013-3559
- CVE-2013-3557
- CVE-2012-5595
- CVE-2012-5600
- CVE-2013-4927
- CVE-2012-5598
- CVE-2012-6062
- CVE-2012-6060
- CVE-2012-6061
- CVE-2013-4933
- CVE-2013-4931
- CVE-2013-4932
- CVE-2013-4935
- CVE-2013-4934
- CVE-2014-2299
- CVE-2013-7112
- CVE-2014-2281
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
wireshark-1.0.15-6.el5_10.src.rpm | SHA-256: d4825ee29e65f1a1b49d44139eaaa9d2cd5afd274958a1ad07a4e99f5f054c43 |
x86_64 | |
wireshark-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c04134ac2bcc91f25e6535f888d180ab257836cfd0af8f12c298e4fffa4158ba |
wireshark-debuginfo-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c6a5a6401491508ec0f93eb83112848392e1bdc95372a556e0ea3056b9d93e6f |
wireshark-gnome-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c195b577308fa55b0539029d59afa4673789fde8c8c800feb35f7f036a405088 |
ia64 | |
wireshark-1.0.15-6.el5_10.ia64.rpm | SHA-256: 3573efd46b1c1c269a1eb9d6efe395805663ca134181ae6c014b3b7db9a723ed |
wireshark-debuginfo-1.0.15-6.el5_10.ia64.rpm | SHA-256: 4860fa5632fc2c7705f17907dd8db1da85b42466c50ac94ee7a6383945346c17 |
wireshark-gnome-1.0.15-6.el5_10.ia64.rpm | SHA-256: 431683a0783ac28e29d3c5b67026530af7bd118e8b484a5b2b0c1fd9b6c5e91d |
i386 | |
wireshark-1.0.15-6.el5_10.i386.rpm | SHA-256: b4dadb68b376a593bbc25a62595df9f9063f46dd214c991bdc2565778aa887f1 |
wireshark-debuginfo-1.0.15-6.el5_10.i386.rpm | SHA-256: 701b5541e1eb31c15b31dafc141d381b4d2febad8bde33546fbe3e5573edc3ca |
wireshark-gnome-1.0.15-6.el5_10.i386.rpm | SHA-256: 8871406edd4636445ab83d4c5ef8ab6141e048de88728fb4d42f7779842ed2c1 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
wireshark-1.0.15-6.el5_10.src.rpm | SHA-256: d4825ee29e65f1a1b49d44139eaaa9d2cd5afd274958a1ad07a4e99f5f054c43 |
x86_64 | |
wireshark-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c04134ac2bcc91f25e6535f888d180ab257836cfd0af8f12c298e4fffa4158ba |
wireshark-debuginfo-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c6a5a6401491508ec0f93eb83112848392e1bdc95372a556e0ea3056b9d93e6f |
wireshark-debuginfo-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c6a5a6401491508ec0f93eb83112848392e1bdc95372a556e0ea3056b9d93e6f |
wireshark-gnome-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c195b577308fa55b0539029d59afa4673789fde8c8c800feb35f7f036a405088 |
i386 | |
wireshark-1.0.15-6.el5_10.i386.rpm | SHA-256: b4dadb68b376a593bbc25a62595df9f9063f46dd214c991bdc2565778aa887f1 |
wireshark-debuginfo-1.0.15-6.el5_10.i386.rpm | SHA-256: 701b5541e1eb31c15b31dafc141d381b4d2febad8bde33546fbe3e5573edc3ca |
wireshark-debuginfo-1.0.15-6.el5_10.i386.rpm | SHA-256: 701b5541e1eb31c15b31dafc141d381b4d2febad8bde33546fbe3e5573edc3ca |
wireshark-gnome-1.0.15-6.el5_10.i386.rpm | SHA-256: 8871406edd4636445ab83d4c5ef8ab6141e048de88728fb4d42f7779842ed2c1 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
wireshark-1.0.15-6.el5_10.src.rpm | SHA-256: d4825ee29e65f1a1b49d44139eaaa9d2cd5afd274958a1ad07a4e99f5f054c43 |
x86_64 | |
wireshark-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c04134ac2bcc91f25e6535f888d180ab257836cfd0af8f12c298e4fffa4158ba |
wireshark-debuginfo-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c6a5a6401491508ec0f93eb83112848392e1bdc95372a556e0ea3056b9d93e6f |
i386 | |
wireshark-1.0.15-6.el5_10.i386.rpm | SHA-256: b4dadb68b376a593bbc25a62595df9f9063f46dd214c991bdc2565778aa887f1 |
wireshark-debuginfo-1.0.15-6.el5_10.i386.rpm | SHA-256: 701b5541e1eb31c15b31dafc141d381b4d2febad8bde33546fbe3e5573edc3ca |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
wireshark-1.0.15-6.el5_10.src.rpm | SHA-256: d4825ee29e65f1a1b49d44139eaaa9d2cd5afd274958a1ad07a4e99f5f054c43 |
s390x | |
wireshark-1.0.15-6.el5_10.s390x.rpm | SHA-256: 626c3373a1f4446cf2482fe16f56849760d2beb3f443b7ea13cccc13300b0d3b |
wireshark-debuginfo-1.0.15-6.el5_10.s390x.rpm | SHA-256: 40863a8b7f8866644819be8eb586f78de8d962dfed6ef6d313905f3043a56a66 |
wireshark-gnome-1.0.15-6.el5_10.s390x.rpm | SHA-256: 9cb9da89d5861d0c354271306ca2bc46e98081f3f0de6ec6b33f98703d310004 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
wireshark-1.0.15-6.el5_10.src.rpm | SHA-256: d4825ee29e65f1a1b49d44139eaaa9d2cd5afd274958a1ad07a4e99f5f054c43 |
ppc | |
wireshark-1.0.15-6.el5_10.ppc.rpm | SHA-256: 90bbe819e1d316f94b34f84892bae02bce2263f400c9e18d8c576c3a0cd8b3cb |
wireshark-debuginfo-1.0.15-6.el5_10.ppc.rpm | SHA-256: 51162b5893e26d0809eb048c2ee2d17bfa59457db2377d14f329462dfdf9ac12 |
wireshark-gnome-1.0.15-6.el5_10.ppc.rpm | SHA-256: 896003ec0227790cac2031b8743ccb95f919a4d8d2fd1f039f7172d6e38c3955 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
wireshark-1.0.15-6.el5_10.src.rpm | SHA-256: d4825ee29e65f1a1b49d44139eaaa9d2cd5afd274958a1ad07a4e99f5f054c43 |
x86_64 | |
wireshark-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c04134ac2bcc91f25e6535f888d180ab257836cfd0af8f12c298e4fffa4158ba |
wireshark-debuginfo-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c6a5a6401491508ec0f93eb83112848392e1bdc95372a556e0ea3056b9d93e6f |
wireshark-gnome-1.0.15-6.el5_10.x86_64.rpm | SHA-256: c195b577308fa55b0539029d59afa4673789fde8c8c800feb35f7f036a405088 |
i386 | |
wireshark-1.0.15-6.el5_10.i386.rpm | SHA-256: b4dadb68b376a593bbc25a62595df9f9063f46dd214c991bdc2565778aa887f1 |
wireshark-debuginfo-1.0.15-6.el5_10.i386.rpm | SHA-256: 701b5541e1eb31c15b31dafc141d381b4d2febad8bde33546fbe3e5573edc3ca |
wireshark-gnome-1.0.15-6.el5_10.i386.rpm | SHA-256: 8871406edd4636445ab83d4c5ef8ab6141e048de88728fb4d42f7779842ed2c1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.