ALT-BU-2016-2632-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-2521
Untrusted search path vulnerability in the WiresharkApplication class in ui/qt/wireshark_application.cpp in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 on Windows allows local users to gain privileges via a Trojan horse riched20.dll.dll file in the current working directory, related to use of QLibrary.
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-01.html
- http://www.wireshark.org/security/wnpa-sec-2016-01.html
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a79cf2e1ab056faaddd252aa56520435b318a56
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a79cf2e1ab056faaddd252aa56520435b318a56
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2522
The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-02.html
- http://www.wireshark.org/security/wnpa-sec-2016-02.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11828
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11828
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9b2f3f7c5c9205381cb72e42b66e97d8ed3abf63
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9b2f3f7c5c9205381cb72e42b66e97d8ed3abf63
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2523
The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- DSA-3516
- DSA-3516
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-03.html
- http://www.wireshark.org/security/wnpa-sec-2016-03.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11938
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11938
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=260afe11feb796d1fde992d8f8c133ebd950b573
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=260afe11feb796d1fde992d8f8c133ebd950b573
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2524
epan/dissectors/packet-x509af.c in the X.509AF dissector in Wireshark 2.0.x before 2.0.2 mishandles the algorithm ID, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-04.html
- http://www.wireshark.org/security/wnpa-sec-2016-04.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12002
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12002
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5a8020a1b6bb73fcb8bb7eb7d53177bc8a9fc703
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5a8020a1b6bb73fcb8bb7eb7d53177bc8a9fc703
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2525
epan/dissectors/packet-http2.c in the HTTP/2 dissector in Wireshark 2.0.x before 2.0.2 does not limit the amount of header data, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-05.html
- http://www.wireshark.org/security/wnpa-sec-2016-05.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12077
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12077
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6a47ac7624993b99966e1d813245ffb419a2d201
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6a47ac7624993b99966e1d813245ffb419a2d201
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2526
epan/dissectors/packet-hiqnet.c in the HiQnet dissector in Wireshark 2.0.x before 2.0.2 does not validate the data type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-06.html
- http://www.wireshark.org/security/wnpa-sec-2016-06.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11983
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11983
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=69a679cc3a9c087064b7e9521b9e9f3c40dd0b72
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=69a679cc3a9c087064b7e9521b9e9f3c40dd0b72
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2527
wiretap/nettrace_3gpp_32_423.c in the 3GPP TS 32.423 Trace file parser in Wireshark 2.0.x before 2.0.2 does not ensure that a '\0' character is present at the end of certain strings, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file.
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-07.html
- http://www.wireshark.org/security/wnpa-sec-2016-07.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11982
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11982
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=140aad08e081489b5cdb715cb5bca01db856fded
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=140aad08e081489b5cdb715cb5bca01db856fded
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2528
The dissect_nhdr_extopt function in epan/dissectors/packet-lbmc.c in the LBMC dissector in Wireshark 2.0.x before 2.0.2 does not validate length values, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-08.html
- http://www.wireshark.org/security/wnpa-sec-2016-08.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11984
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11984
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1c090e929269a78bf7a4cb3dc0d34565f4351312
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1c090e929269a78bf7a4cb3dc0d34565f4351312
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2529
The iseries_check_file_type function in wiretap/iseries.c in the iSeries file parser in Wireshark 2.0.x before 2.0.2 does not consider that a line may lack the "OBJECT PROTOCOL" substring, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-09.html
- http://www.wireshark.org/security/wnpa-sec-2016-09.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11985
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11985
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=96d585a5e9baef21e1eea8505d78305b034dc80e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=96d585a5e9baef21e1eea8505d78305b034dc80e
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2530
The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- DSA-3516
- DSA-3516
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-10.html
- http://www.wireshark.org/security/wnpa-sec-2016-10.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2531
Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- DSA-3516
- DSA-3516
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-10.html
- http://www.wireshark.org/security/wnpa-sec-2016-10.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=de65fd6b00d0b891930324b9549c93ccfe9cac30
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=de65fd6b00d0b891930324b9549c93ccfe9cac30
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2532
The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- DSA-3516
- DSA-3516
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-11.html
- http://www.wireshark.org/security/wnpa-sec-2016-11.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12048
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12048
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a2cd6c79ecbf2cb21f985f01ce1c1e3030285ec
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a2cd6c79ecbf2cb21f985f01ce1c1e3030285ec
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-4415
wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 2.x before 2.0.2 incorrectly increases a certain octet count, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted file.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11795
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11795
- https://code.google.com/p/google-security-research/issues/detail?id=647
- https://code.google.com/p/google-security-research/issues/detail?id=647
- https://www.wireshark.org/security/wnpa-sec-2016-12.html
- https://www.wireshark.org/security/wnpa-sec-2016-12.html
Modified: 2024-11-21
CVE-2016-4416
epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.2 mishandles the Grouping subfield, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
Modified: 2024-11-21
CVE-2016-4417
Off-by-one error in epan/dissectors/packet-gsm_abis_oml.c in the GSM A-bis OML dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet that triggers a 0xff tag value.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11825
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11825
- https://www.wireshark.org/security/wnpa-sec-2016-14.html
- https://www.wireshark.org/security/wnpa-sec-2016-14.html
Modified: 2024-11-21
CVE-2016-4418
epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet that triggers an empty set.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12106
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12106
- https://www.wireshark.org/security/wnpa-sec-2016-15.html
- https://www.wireshark.org/security/wnpa-sec-2016-15.html
Modified: 2024-11-21
CVE-2016-4419
epan/dissectors/packet-spice.c in the SPICE dissector in Wireshark 2.x before 2.0.2 mishandles capability data, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.
Modified: 2024-11-21
CVE-2016-4420
The NFS dissector in Wireshark 2.x before 2.0.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Modified: 2024-11-21
CVE-2016-4421
epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (deep recursion, stack consumption, and application crash) via a packet that specifies deeply nested data.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11822
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11822
- https://www.wireshark.org/security/wnpa-sec-2016-18.html
- https://www.wireshark.org/security/wnpa-sec-2016-18.html