SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Wireshark Vendors:   Wireshark.org
(Oracle Issues Fix for Oracle Linux) Wireshark ATN-CPDLC/WCP/LLDP/TNEF/SCSI OSD Dissector Bugs Let Remote Users Deny Service
SecurityTracker Alert ID:  1033119
SecurityTracker URL:  http://securitytracker.com/id/1033119
CVE Reference:   CVE-2015-2189, CVE-2015-2191   (Links to External Site)
Date:  Jul 29 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.10.0 to 1.10.12, 1.12.0 to 1.12.3
Description:   Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions on the target system.

A remote user can send specially crafted data to cause the target application to crash.

The ATN-CPDLC dissector is affected [CVE-2015-2187]. Versions 1.12.0 to 1.12.3 are affected.

The WCP dissector is affected [CVE-2015-2188].

The pcapng file parser is affected [CVE-2015-2189].

The LLDP dissector is affected [CVE-2015-2190]. Versions 1.12.0 to 1.12.3 are affected.

A remote user can send specially crafted data to cause the target application to enter an infinite loop.

The TNEF dissector is affected [CVE-2015-2191]. Vlad Tsyrklevich reported this vulnerability.

The SCSI OSD dissector is affected [CVE-2015-2192]. Versions 1.12.0 to 1.12.3 are affected. Vlad Tsyrklevich reported this vulnerability.

Impact:   A remote user can cause the target application to crash or enter an infinite loop.
Solution:   Oracle has issued a fix for CVE-2015-2189 and CVE-2015-2191.

The Oracle advisory is available at:

http://linux.oracle.com/errata/ELSA-2015-1460.html

Vendor URL:  linux.oracle.com/errata/ELSA-2015-1460.html (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Mar 6 2015 Wireshark ATN-CPDLC/WCP/LLDP/TNEF/SCSI OSD Dissector Bugs Let Remote Users Deny Service



 Source Message Contents

Subject:  [El-errata] ELSA-2015-1460 Moderate: Oracle Linux 6 wireshark security, bug fix, and enhancement update

Oracle Linux Security Advisory ELSA-2015-1460

http://linux.oracle.com/errata/ELSA-2015-1460.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
wireshark-1.8.10-17.0.2.el6.i686.rpm
wireshark-devel-1.8.10-17.0.2.el6.i686.rpm
wireshark-gnome-1.8.10-17.0.2.el6.i686.rpm

x86_64:
wireshark-1.8.10-17.0.2.el6.i686.rpm
wireshark-1.8.10-17.0.2.el6.x86_64.rpm
wireshark-devel-1.8.10-17.0.2.el6.i686.rpm
wireshark-devel-1.8.10-17.0.2.el6.x86_64.rpm
wireshark-gnome-1.8.10-17.0.2.el6.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/wireshark-1.8.10-17.0.2.el6.src.rpm



Description of changes:

[1.8.10-17.0.2]
- Fix ocfs2 dissector (John Haxby) [orabug 21505640]

[1.8.10-17.0.1.el6]
- Add oracle-ocfs2-network.patch to allow disassembly of OCFS2 interconnect

[1.8.10-17]
- security patches
- Resolves: CVE-2015-2189
             CVE-2015-2191

[1.8.10-16]
- security patches
- Resolves: CVE-2014-8710
             CVE-2014-8711
             CVE-2014-8712
             CVE-2014-8713
             CVE-2014-8714
             CVE-2015-0562
             CVE-2015-0564

[1.8.10-15]
- fix AES-GCM decoding
- Related: rhbz#1095065

[1.8.10-14]
- fix requires: shadow-utils
- Resolves: rhbz#1121275

[1.8.10-13]
- add elliptic curves decoding in DTLS HELLO
- Resolves: rhbz#1131203

[1.8.10-12]
- add AES-GCM decryption
- Resolves: rhbz#1095065

[1.8.10-11]
- fix reading from pipes
- Resolves: rhbz#1104210

[1.8.10-10]
- introduced nanosecond time precision
- Resolves: rhbz#1146578

[1.8.10-9]
- fix gtk2 required version
- Resolves: rhbz#1160388


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC