SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Wireshark Vendors:   Wireshark.org
(Red Hat Issues Fix) Wireshark DHCP/BOOTP, MMS, SSL, DCP ETSI, iSeries, and HTTP Chunked Response Bugs Let Remote Users Deny Service
SecurityTracker Alert ID:  1018973
SecurityTracker URL:  http://securitytracker.com/id/1018973
CVE Reference:   CVE-2007-3389, CVE-2007-3390, CVE-2007-3391, CVE-2007-3392, CVE-2007-3393   (Links to External Site)
Date:  Nov 16 2007
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 0.99.6
Description:   Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

A remote user can send specially crafted data to cause the target service to crash.

An HTTP chunked response can trigger a crash.

iSeries capture files can trigger a crash.

A DCP ETSI packet can cause the system to consume all available memory.

An SSL packet can cause the Wireshark to loop "excessively".

A MMS packet can cause the Wireshark to loop "excessively".

A specially crafted packet can trigger an off-by-one error in the DHCP/BOOTP dissector.

Impact:   A remote user can cause denial of service conditions.
Solution:   Red Hat has released a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2007-0709.html

Vendor URL:  www.wireshark.org/security/wnpa-sec-2007-02.html (Links to External Site)
Cause:   Boundary error, Input validation error, State error
Underlying OS:   Linux (Red Hat Enterprise)

Message History:   This archive entry is a follow-up to the message listed below.
Jun 27 2007 Wireshark DHCP/BOOTP, MMS, SSL, DCP ETSI, iSeries, and HTTP Chunked Response Bugs Let Remote Users Deny Service



 Source Message Contents

Date:  Thu, 15 Nov 2007 10:04:13 -0500
Subject:  [RHSA-2007:0709-02] Low: wireshark security and bug fix update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: wireshark security and bug fix update
Advisory ID:       RHSA-2007:0709-02
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0709.html
Issue date:        2007-11-15
Updated on:        2007-11-15
Product:           Red Hat Enterprise Linux
Keywords:          HTTP iSeries DCP ETSI SSL MMS DHCP BOOTP crash loop DoS IPMI
CVE Names:         CVE-2007-3389 CVE-2007-3390 CVE-2007-3391 
                   CVE-2007-3392 CVE-2007-3393 
- ---------------------------------------------------------------------

1. Summary:

New Wireshark packages that fix various security vulnerabilities and
functionality bugs are now available for Red Hat Enterprise Linux 4.
Wireshark was previously known as Ethereal.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Wireshark is a program for monitoring network traffic.

Several denial of service bugs were found in Wireshark's HTTP, iSeries, DCP
ETSI, SSL, MMS, DHCP and BOOTP protocol dissectors. It was possible for
Wireshark to crash or stop responding if it read a malformed packet off the
network. (CVE-2007-3389, CVE-2007-3390, CVE-2007-3391, CVE-2007-3392,
CVE-2007-3393)

Wireshark would interpret certain completion codes incorrectly when
dissecting IPMI traffic. Additionally, IPMI 2.0 packets would be reported
as malformed IPMI traffic.

Users of Wireshark should upgrade to these updated packages containing
Wireshark version 0.99.6, which correct these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

245796 - CVE-2007-3389 Wireshark crashes when inspecting HTTP traffic
245797 - CVE-2007-3391 Wireshark loops infinitely when inspecting DCP ETSI traffic
245798 - CVE-2007-3392 Wireshark loops infinitely when inspecting SSL traffic
246221 - CVE-2007-3393 Wireshark corrupts the stack when inspecting BOOTP traffic
246225 - CVE-2007-3390 Wireshark crashes when inspecting iSeries traffic
246229 - CVE-2007-3392 Wireshark crashes when inspecting MMS traffic

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/wireshark-0.99.6-EL4.1.src.rpm
2d8ad27725033ac2bbadd5a385b6ae76  wireshark-0.99.6-EL4.1.src.rpm

i386:
3c6c77126ea4b1999f75a18a283d6499  wireshark-0.99.6-EL4.1.i386.rpm
8ac66efd8177234af75cf8af1bed2706  wireshark-debuginfo-0.99.6-EL4.1.i386.rpm
ce5d1420de890fab97bb8c84617d1f25  wireshark-gnome-0.99.6-EL4.1.i386.rpm

ia64:
1db9e6a01562b42162772472433ec40c  wireshark-0.99.6-EL4.1.ia64.rpm
4602cc3474ca776e4b8a3340664fa308  wireshark-debuginfo-0.99.6-EL4.1.ia64.rpm
2be1f400717544434423277057fb8a6a  wireshark-gnome-0.99.6-EL4.1.ia64.rpm

ppc:
851e28e735d2cca81f036e84c10592de  wireshark-0.99.6-EL4.1.ppc.rpm
c1aa1b3e309e1246d2b2067811b759fe  wireshark-debuginfo-0.99.6-EL4.1.ppc.rpm
ca38499152427371121737fcfe545a1a  wireshark-gnome-0.99.6-EL4.1.ppc.rpm

s390:
deaa06304c3926eed158bed8a15b2e2b  wireshark-0.99.6-EL4.1.s390.rpm
c63f46b2598583595ca4d4d38d7e44b0  wireshark-debuginfo-0.99.6-EL4.1.s390.rpm
2020932bacbcdbbad055735ac0b0100e  wireshark-gnome-0.99.6-EL4.1.s390.rpm

s390x:
dc81c1505a3040328ab53cd449b388cd  wireshark-0.99.6-EL4.1.s390x.rpm
a22957a9c7bdf4976edcd2f6d7c0c5d2  wireshark-debuginfo-0.99.6-EL4.1.s390x.rpm
88a5ef4d0cf176f18fcf0381c8e80d2e  wireshark-gnome-0.99.6-EL4.1.s390x.rpm

x86_64:
a42ab0969e973cdab74c439427e21cfe  wireshark-0.99.6-EL4.1.x86_64.rpm
6d12a229024b47a7ad5b6efcf71cb1d7  wireshark-debuginfo-0.99.6-EL4.1.x86_64.rpm
0c41fb92a893e0e031be4be98d54db3d  wireshark-gnome-0.99.6-EL4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/wireshark-0.99.6-EL4.1.src.rpm
2d8ad27725033ac2bbadd5a385b6ae76  wireshark-0.99.6-EL4.1.src.rpm

i386:
3c6c77126ea4b1999f75a18a283d6499  wireshark-0.99.6-EL4.1.i386.rpm
8ac66efd8177234af75cf8af1bed2706  wireshark-debuginfo-0.99.6-EL4.1.i386.rpm
ce5d1420de890fab97bb8c84617d1f25  wireshark-gnome-0.99.6-EL4.1.i386.rpm

x86_64:
a42ab0969e973cdab74c439427e21cfe  wireshark-0.99.6-EL4.1.x86_64.rpm
6d12a229024b47a7ad5b6efcf71cb1d7  wireshark-debuginfo-0.99.6-EL4.1.x86_64.rpm
0c41fb92a893e0e031be4be98d54db3d  wireshark-gnome-0.99.6-EL4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/wireshark-0.99.6-EL4.1.src.rpm
2d8ad27725033ac2bbadd5a385b6ae76  wireshark-0.99.6-EL4.1.src.rpm

i386:
3c6c77126ea4b1999f75a18a283d6499  wireshark-0.99.6-EL4.1.i386.rpm
8ac66efd8177234af75cf8af1bed2706  wireshark-debuginfo-0.99.6-EL4.1.i386.rpm
ce5d1420de890fab97bb8c84617d1f25  wireshark-gnome-0.99.6-EL4.1.i386.rpm

ia64:
1db9e6a01562b42162772472433ec40c  wireshark-0.99.6-EL4.1.ia64.rpm
4602cc3474ca776e4b8a3340664fa308  wireshark-debuginfo-0.99.6-EL4.1.ia64.rpm
2be1f400717544434423277057fb8a6a  wireshark-gnome-0.99.6-EL4.1.ia64.rpm

x86_64:
a42ab0969e973cdab74c439427e21cfe  wireshark-0.99.6-EL4.1.x86_64.rpm
6d12a229024b47a7ad5b6efcf71cb1d7  wireshark-debuginfo-0.99.6-EL4.1.x86_64.rpm
0c41fb92a893e0e031be4be98d54db3d  wireshark-gnome-0.99.6-EL4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/wireshark-0.99.6-EL4.1.src.rpm
2d8ad27725033ac2bbadd5a385b6ae76  wireshark-0.99.6-EL4.1.src.rpm

i386:
3c6c77126ea4b1999f75a18a283d6499  wireshark-0.99.6-EL4.1.i386.rpm
8ac66efd8177234af75cf8af1bed2706  wireshark-debuginfo-0.99.6-EL4.1.i386.rpm
ce5d1420de890fab97bb8c84617d1f25  wireshark-gnome-0.99.6-EL4.1.i386.rpm

ia64:
1db9e6a01562b42162772472433ec40c  wireshark-0.99.6-EL4.1.ia64.rpm
4602cc3474ca776e4b8a3340664fa308  wireshark-debuginfo-0.99.6-EL4.1.ia64.rpm
2be1f400717544434423277057fb8a6a  wireshark-gnome-0.99.6-EL4.1.ia64.rpm

x86_64:
a42ab0969e973cdab74c439427e21cfe  wireshark-0.99.6-EL4.1.x86_64.rpm
6d12a229024b47a7ad5b6efcf71cb1d7  wireshark-debuginfo-0.99.6-EL4.1.x86_64.rpm
0c41fb92a893e0e031be4be98d54db3d  wireshark-gnome-0.99.6-EL4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393
http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html
http://www.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHPF/rXlSAg2UNWIIRAoyzAJ9K/9B3CENYFAyN3PqCV08IxqkCnQCfWV2p
GVjI6MegPzphK0NEzD+n/6U=
=6t+M
-----END PGP SIGNATURE-----



-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC