The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Wireshark: several vulnerabilities

Synthesis of the vulnerability 

Several vulnerabilities of Wireshark can be used by a remote attacker to create a denial of service or to execute code.
Impacted software: Debian, Ethereal, Fedora, Mandriva Linux, NLD, OES, openSUSE, RHEL, SLES, Wireshark.
Severity of this computer vulnerability: 2/4.
Number of vulnerabilities in this bulletin: 5.
Creation date: 10/06/2010.
Références of this announce: 4734, 4826, 4837, BID-40728, CERTA-2002-AVI-268, CERTA-2010-AVI-260, CVE-2010-2283, CVE-2010-2284, CVE-2010-2285, CVE-2010-2286, CVE-2010-2287, DSA-2066-1, FEDORA-2010-13416, FEDORA-2010-13427, MDVSA-2010:113, openSUSE-SU-2011:0010-1, openSUSE-SU-2011:0010-2, RHSA-2010:0625-01, SUSE-SR:2011:001, SUSE-SR:2011:002, SUSE-SR:2011:007, VIGILANCE-VUL-9700.

Description of the vulnerability 

The Wireshark program captures and displays network packets. Protocols are decoded by dissectors. They are impacted by several vulnerabilities.

An attacker can force the SMB dissector to dereference a NULL pointer, which stops it. [severity:1/4; 4734, CERTA-2010-AVI-260, CVE-2010-2283]

An attacker can generate a buffer overflow in the ASN.1 BER dissector. [severity:2/4; CVE-2010-2284]

An attacker can force the SMB PIPE dissector to dereference a NULL pointer, which stops it. [severity:1/4; CVE-2010-2285]

An attacker can generate an infinite loop in the SigComp Universal Decompressor Virtual Machine dissector. [severity:1/4; 4826, CVE-2010-2286]

An attacker can generate a buffer overflow in the SigComp Universal Decompressor Virtual Machine dissector. [severity:2/4; 4837, CVE-2010-2287]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity vulnerability impacts software or systems such as Debian, Ethereal, Fedora, Mandriva Linux, NLD, OES, openSUSE, RHEL, SLES, Wireshark.

Our Vigil@nce team determined that the severity of this vulnerability is medium.

The trust level is of type confirmed by the editor, with an origin of intranet client.

This bulletin is about 5 vulnerabilities.

An attacker with a expert ability can exploit this weakness alert.

Solutions for this threat 

Wireshark: version 1.2.9.
Version 1.2.9 is corrected:
  http://www.wireshark.org/

Wireshark: version 1.0.14.
Version 1.0.14 is corrected:
  http://www.wireshark.org/

Debian: new wireshark packages.
New packages are available:
  http://security.debian.org/pool/updates/main/w/wireshark/*_1.0.2-3+lenny9_*.deb

Fedora: new wireshark packages.
New packages are available:
  wireshark-1.2.10-1.fc12
  wireshark-1.2.10-1.fc13

Mandriva: new wireshark packages.
New packages are available:
  Mandriva Linux 2009.1: wireshark-1.0.14-0.1mdv2009.1
  Mandriva Linux 2010.0: wireshark-1.2.9-0.1mdv2010.0
  Corporate 4.0: wireshark-1.0.14-0.1.20060mlcs4
  Mandriva Enterprise Server 5: wireshark-1.0.14-0.1mdvmes5.1

openSUSE 11.1: new wireshark packages.
New packages are available:
  wireshark-1.4.2-1.1.1

openSUSE: new wireshark packages.
New packages are available:
  openSUSE 11.2 : wireshark-1.4.2-1.1.1
  openSUSE 11.3 : wireshark-1.4.2-1.1.2

RHEL 3, 4, 5: new wireshark packages.
New packages are available:
Red Hat Enterprise Linux version 3:
  wireshark-1.0.15-EL3.1
Red Hat Enterprise Linux version 4:
  wireshark-1.0.15-1.el4_8.1
Red Hat Enterprise Linux version 5:
  wireshark-1.0.15-1.el5_5.1

SUSE: new packages (11/01/2011).
New packages are available, as indicated in information sources.

SUSE: new packages (19/04/2011).
New packages are available, as indicated in information sources.

SUSE: new packages (25/01/2011).
New packages are available, as indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides cybersecurity alerts. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.