|
Message-ID: <4F72D229.2010900@redhat.com> Date: Wed, 28 Mar 2012 14:26:09 +0530 From: Huzaifa Sidhpurwala <huzaifas@...hat.com> To: oss-security@...ts.openwall.com CC: Gerald Combs <gerald@...eshark.org> Subject: CVE Request: Multiple wireshark security flaws resolved in 1.4.12 and 1.6.6 Hi Folks, Multiple security flaws were resolved in the recent release of version 1.4.12 and 1.6.6. Details as follows, can CVE ids be please assigned to them? 1. Null pointer dereference in ANSI A dissector: The ANSI A dissector could dereference a NULL pointer and crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Reference: http://www.wireshark.org/security/wnpa-sec-2012-04.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6823 Patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=40962 2. Dos/Infinite loop when in IEEE 802.11 dissector: The IEEE 802.11 dissector could go into an infinite loop. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Reference: http://www.wireshark.org/security/wnpa-sec-2012-05.html http://www.wireshark.org/security/wnpa-sec-2012-05.html Patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=40967 3. Memory corruption when processing pcap/pcap-ng file formats: The pcap and pcap-ng file parsers could crash trying to read ERF data. It may be possible to make Wireshark crash convincing someone to read a malformed packet trace file. Reference: http://www.wireshark.org/security/wnpa-sec-2012-06.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6804 Patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=41056 4. Wireshark MP2T memory allocation flaw The MP2T dissector could try to allocate too much memory and crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Reference: http://www.wireshark.org/security/wnpa-sec-2012-07.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6833 Possible Patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=40978 (not sure) @Gerald, All your new advisory links on the wireshark security page are pointing to the same page, so you may want to correct that :) -- Huzaifa Sidhpurwala / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.