Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 11 Jan 2012 17:19:57 +0100
From: Agostino Sarubbo <ago@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: Wireshark multiple vulnerabilities

According to secunia advisory: https://secunia.com/advisories/47494/ :

Multiple vulnerabilities have been reported in Wireshark, which can be 
exploited by malicious people to cause a DoS (Denial of Service) and 
compromise a user's system.

1) NULL pointer dereference errors when reading certain packet information can 
be exploited to cause a crash.

2) An error within the RLC dissector can be exploited to cause a buffer 
overflow via a specially crafted RLC packet capture file.

and according with upstream advisory:

1)http://www.wireshark.org/security/wnpa-sec-2012-01.html
Name: Multiple Wireshark file parser vulnerabilities
Description:
Laurent Butti discovered that Wireshark failed to properly check record sizes 
for many packet capture file formats.
Impact:
It may be possible to make Wireshark crash by convincing someone to read a 
malformed packet trace file.

2)http://www.wireshark.org/security/wnpa-sec-2012-02.html
Name: Wireshark NULL pointer vulnerabilities
Description:
Wireshark was improperly handling NULL pointers when displaying packet 
information which could lead to a crash.
Impact:
It may be possible to make Wireshark crash by injecting a malformed packet 
onto the wire or by convincing someone to read a malformed packet trace file.

3)http://www.wireshark.org/security/wnpa-sec-2012-03.html
Name: Wireshark RLC dissector buffer overflow
Description:
The RLC dissector could overflow a buffer.
Impact:
It may be possible to make Wireshark crash by injecting a malformed packet 
onto the wire or by convincing someone to read a malformed packet trace file.

-- 
Agostino Sarubbo		ago -at- gentoo.org
Gentoo/AMD64 Arch Security Liaison
GPG: 0x7CD2DC5D

Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.