SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Wireshark Vendors:   Wireshark.org
Wireshark Dissector/Parser Bugs Let Remote Users Deny Service
SecurityTracker Alert ID:  1036480
SecurityTracker URL:  http://securitytracker.com/id/1036480
CVE Reference:   CVE-2016-6503, CVE-2016-6504, CVE-2016-6505, CVE-2016-6506, CVE-2016-6507, CVE-2016-6508, CVE-2016-6509, CVE-2016-6510, CVE-2016-6511, CVE-2016-6512, CVE-2016-6513   (Links to External Site)
Updated:  Aug 11 2016
Original Entry Date:  Jul 29 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 1.12.13 , 2.0.5
Description:   Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions on the target system.

A remote user can send specially crafted data to cause the target service to crash or enter an infinite loop and consume excessive CPU resources.

CORBA IDL dissectors on 64-bit Windows systems are affected [CVE-2016-6503]. Version 2.0.x is affected.

The NDS dissector is affected [CVE-2016-6504]. Version 1.12.x is affected.

The PacketBB dissector is affected by a divide by zero error [CVE-2016-6505].

The WSP dissector is affected [CVE-2016-6506].

The MMSE dissector is affected [CVE-2016-6507]. Version 1.12.x is affected.

The RLC dissector is affected [CVE-2016-6508].

The LDSS dissector is affected [CVE-2016-6509].

The RLC dissector is affected [CVE-2016-6510].

The OpenFlow dissector is affected [CVE-2016-6511].

The MMSE, WAP, WBXML, and WSP dissectors are affected [CVE-2016-6512]. Version 2.0.x is affected.

The WBXML dissector is affected [CVE-2016-6513]. Version 2.0.x is affected.

Chris Benedict and Aurelien Delaitre of the NIST SAMATE Project reported several vulnerabilities. Antti Levomaki reported several vulnerabilities.

Impact:   A remote user can cause the target service to crash.
Solution:   The vendor has issued a fix (1.12.13 , 2.0.5).

The vendor advisories are available at:

https://www.wireshark.org/security/wnpa-sec-2016-39.html
https://www.wireshark.org/security/wnpa-sec-2016-40.html
https://www.wireshark.org/security/wnpa-sec-2016-41.html
https://www.wireshark.org/security/wnpa-sec-2016-42.html
https://www.wireshark.org/security/wnpa-sec-2016-43.html
https://www.wireshark.org/security/wnpa-sec-2016-44.html
https://www.wireshark.org/security/wnpa-sec-2016-45.html
https://www.wireshark.org/security/wnpa-sec-2016-46.html
https://www.wireshark.org/security/wnpa-sec-2016-47.html
https://www.wireshark.org/security/wnpa-sec-2016-48.html
https://www.wireshark.org/security/wnpa-sec-2016-49.html

Vendor URL:  www.wireshark.org/security/wnpa-sec-2016-39.html (Links to External Site)
Cause:   Access control error, Resource error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC