|
Message-ID: <2273600.2E0aOJkKJz@devil>
Date: Wed, 11 Jan 2012 17:19:57 +0100
From: Agostino Sarubbo <ago@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: Wireshark multiple vulnerabilities
According to secunia advisory: https://secunia.com/advisories/47494/ :
Multiple vulnerabilities have been reported in Wireshark, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
compromise a user's system.
1) NULL pointer dereference errors when reading certain packet information can
be exploited to cause a crash.
2) An error within the RLC dissector can be exploited to cause a buffer
overflow via a specially crafted RLC packet capture file.
and according with upstream advisory:
1)http://www.wireshark.org/security/wnpa-sec-2012-01.html
Name: Multiple Wireshark file parser vulnerabilities
Description:
Laurent Butti discovered that Wireshark failed to properly check record sizes
for many packet capture file formats.
Impact:
It may be possible to make Wireshark crash by convincing someone to read a
malformed packet trace file.
2)http://www.wireshark.org/security/wnpa-sec-2012-02.html
Name: Wireshark NULL pointer vulnerabilities
Description:
Wireshark was improperly handling NULL pointers when displaying packet
information which could lead to a crash.
Impact:
It may be possible to make Wireshark crash by injecting a malformed packet
onto the wire or by convincing someone to read a malformed packet trace file.
3)http://www.wireshark.org/security/wnpa-sec-2012-03.html
Name: Wireshark RLC dissector buffer overflow
Description:
The RLC dissector could overflow a buffer.
Impact:
It may be possible to make Wireshark crash by injecting a malformed packet
onto the wire or by convincing someone to read a malformed packet trace file.
--
Agostino Sarubbo ago -at- gentoo.org
Gentoo/AMD64 Arch Security Liaison
GPG: 0x7CD2DC5D
Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.