ALT-BU-2014-2990-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-3616
nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks.
Closed vulnerabilities
BDU:2015-00769
Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00770
Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00771
Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00772
Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00773
Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00774
Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00775
Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00776
Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00782
Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-00783
Уязвимость программного обеспечения Wireshark Network Protocol Analyzer, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2024-11-21
CVE-2014-6423
The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1677
- http://linux.oracle.com/errata/ELSA-2014-1677
- SUSE-SU-2014:1221
- SUSE-SU-2014:1221
- openSUSE-SU-2014:1249
- openSUSE-SU-2014:1249
- RHSA-2014:1676
- RHSA-2014:1676
- RHSA-2014:1677
- RHSA-2014:1677
- 60280
- 60280
- 60578
- 60578
- 61929
- 61929
- 61933
- 61933
- DSA-3049
- DSA-3049
- http://www.wireshark.org/security/wnpa-sec-2014-13.html
- http://www.wireshark.org/security/wnpa-sec-2014-13.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10333
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10333
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9112a099d7cc2cd924b7c667bf27f6e112b970c6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9112a099d7cc2cd924b7c667bf27f6e112b970c6
Modified: 2024-11-21
CVE-2014-6424
The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1676
- SUSE-SU-2014:1221
- SUSE-SU-2014:1221
- openSUSE-SU-2014:1249
- openSUSE-SU-2014:1249
- RHSA-2014:1676
- RHSA-2014:1676
- 60280
- 60280
- 60578
- 60578
- 61929
- 61929
- DSA-3049
- DSA-3049
- http://www.wireshark.org/security/wnpa-sec-2014-14.html
- http://www.wireshark.org/security/wnpa-sec-2014-14.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10370
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10370
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=44698259b1f5865c60323acaf2a633654a2abe81
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=44698259b1f5865c60323acaf2a633654a2abe81
Modified: 2024-11-21
CVE-2014-6425
The (1) get_quoted_string and (2) get_unquoted_string functions in epan/dissectors/packet-cups.c in the CUPS dissector in Wireshark 1.12.x before 1.12.1 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a CUPS packet that lacks a trailing '\0' character.
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1677
- http://linux.oracle.com/errata/ELSA-2014-1677
- RHSA-2014:1676
- RHSA-2014:1676
- RHSA-2014:1677
- RHSA-2014:1677
- 60280
- 60280
- 61929
- 61929
- 61933
- 61933
- http://www.wireshark.org/security/wnpa-sec-2014-15.html
- http://www.wireshark.org/security/wnpa-sec-2014-15.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10353
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10353
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c10396dbbf782a576bc1f9a931cf86090cec3878
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c10396dbbf782a576bc1f9a931cf86090cec3878
Modified: 2024-11-21
CVE-2014-6426
The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1676
- RHSA-2014:1676
- RHSA-2014:1676
- 60280
- 60280
- 61929
- 61929
- http://www.wireshark.org/security/wnpa-sec-2014-16.html
- http://www.wireshark.org/security/wnpa-sec-2014-16.html
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d9e5021fe79973d00ddd8fcef0bbefbaae63dd0f
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d9e5021fe79973d00ddd8fcef0bbefbaae63dd0f
Modified: 2024-11-21
CVE-2014-6427
Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1676
- SUSE-SU-2014:1221
- SUSE-SU-2014:1221
- openSUSE-SU-2014:1249
- openSUSE-SU-2014:1249
- RHSA-2014:1676
- RHSA-2014:1676
- 60280
- 60280
- 60578
- 60578
- 61929
- 61929
- DSA-3049
- DSA-3049
- http://www.wireshark.org/security/wnpa-sec-2014-17.html
- http://www.wireshark.org/security/wnpa-sec-2014-17.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=73959159dbf34b4a0b50fbd19e05cb1b470be9b0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=73959159dbf34b4a0b50fbd19e05cb1b470be9b0
Modified: 2024-11-21
CVE-2014-6428
The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1677
- http://linux.oracle.com/errata/ELSA-2014-1677
- SUSE-SU-2014:1221
- SUSE-SU-2014:1221
- openSUSE-SU-2014:1249
- openSUSE-SU-2014:1249
- RHSA-2014:1676
- RHSA-2014:1676
- RHSA-2014:1677
- RHSA-2014:1677
- 60280
- 60280
- 60578
- 60578
- 61929
- 61929
- 61933
- 61933
- DSA-3049
- DSA-3049
- http://www.wireshark.org/security/wnpa-sec-2014-18.html
- http://www.wireshark.org/security/wnpa-sec-2014-18.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10454
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10454
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=433a444d148f86f2562f804d25a57d00dc277cc0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=433a444d148f86f2562f804d25a57d00dc277cc0
Modified: 2024-11-21
CVE-2014-6429
The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1677
- http://linux.oracle.com/errata/ELSA-2014-1677
- SUSE-SU-2014:1221
- SUSE-SU-2014:1221
- openSUSE-SU-2014:1249
- openSUSE-SU-2014:1249
- RHSA-2014:1676
- RHSA-2014:1676
- RHSA-2014:1677
- RHSA-2014:1677
- 60280
- 60280
- 60578
- 60578
- 61929
- 61929
- 61933
- 61933
- DSA-3049
- DSA-3049
- http://www.wireshark.org/security/wnpa-sec-2014-19.html
- http://www.wireshark.org/security/wnpa-sec-2014-19.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2
Modified: 2024-11-21
CVE-2014-6430
The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1677
- http://linux.oracle.com/errata/ELSA-2014-1677
- SUSE-SU-2014:1221
- SUSE-SU-2014:1221
- openSUSE-SU-2014:1249
- openSUSE-SU-2014:1249
- RHSA-2014:1676
- RHSA-2014:1676
- RHSA-2014:1677
- RHSA-2014:1677
- 60280
- 60280
- 60578
- 60578
- 61929
- 61929
- 61933
- 61933
- DSA-3049
- DSA-3049
- http://www.wireshark.org/security/wnpa-sec-2014-19.html
- http://www.wireshark.org/security/wnpa-sec-2014-19.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2
Modified: 2024-11-21
CVE-2014-6431
Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1677
- http://linux.oracle.com/errata/ELSA-2014-1677
- SUSE-SU-2014:1221
- SUSE-SU-2014:1221
- openSUSE-SU-2014:1249
- openSUSE-SU-2014:1249
- RHSA-2014:1676
- RHSA-2014:1676
- RHSA-2014:1677
- RHSA-2014:1677
- 60280
- 60280
- 60578
- 60578
- 61929
- 61929
- 61933
- 61933
- DSA-3049
- DSA-3049
- http://www.wireshark.org/security/wnpa-sec-2014-19.html
- http://www.wireshark.org/security/wnpa-sec-2014-19.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2
Modified: 2024-11-21
CVE-2014-6432
The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1676
- http://linux.oracle.com/errata/ELSA-2014-1677
- http://linux.oracle.com/errata/ELSA-2014-1677
- SUSE-SU-2014:1221
- SUSE-SU-2014:1221
- openSUSE-SU-2014:1249
- openSUSE-SU-2014:1249
- RHSA-2014:1676
- RHSA-2014:1676
- RHSA-2014:1677
- RHSA-2014:1677
- 60280
- 60280
- 60578
- 60578
- 61929
- 61929
- 61933
- 61933
- DSA-3049
- DSA-3049
- http://www.wireshark.org/security/wnpa-sec-2014-19.html
- http://www.wireshark.org/security/wnpa-sec-2014-19.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2