ALT-BU-2017-3184-1
Branch c8 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-6014
In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
Modified: 2024-11-21
CVE-2017-6467
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a Netscaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by changing the restrictions on file size.
- DSA-3811
- DSA-3811
- 96561
- 96561
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=284ad58d288722a8725401967bff0c4455488f0c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=284ad58d288722a8725401967bff0c4455488f0c
- https://www.wireshark.org/security/wnpa-sec-2017-11.html
- https://www.wireshark.org/security/wnpa-sec-2017-11.html
Modified: 2024-11-21
CVE-2017-6468
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser crash, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating the relationship between pages and records.
- DSA-3811
- DSA-3811
- 96569
- 96569
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf
- https://www.wireshark.org/security/wnpa-sec-2017-08.html
- https://www.wireshark.org/security/wnpa-sec-2017-08.html
Modified: 2024-11-21
CVE-2017-6469
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an LDSS dissector crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-ldss.c by ensuring that memory is allocated for a certain data structure.
- DSA-3811
- DSA-3811
- 96577
- 96577
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f753c127082d5e28abf482d6d175cbfee6661f7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f753c127082d5e28abf482d6d175cbfee6661f7
- https://www.wireshark.org/security/wnpa-sec-2017-03.html
- https://www.wireshark.org/security/wnpa-sec-2017-03.html
Modified: 2024-11-21
CVE-2017-6470
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an IAX2 infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-iax2.c by constraining packet lateness.
- DSA-3811
- DSA-3811
- 96563
- 96563
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0b89174ef4c531a1917437fff586fe525ee7bf2d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0b89174ef4c531a1917437fff586fe525ee7bf2d
- https://www.wireshark.org/security/wnpa-sec-2017-10.html
- https://www.wireshark.org/security/wnpa-sec-2017-10.html
Modified: 2024-11-21
CVE-2017-6471
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a WSP infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by validating the capability length.
- DSA-3811
- DSA-3811
- 96564
- 96564
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=62afef41277dfac37f515207ca73d33306e3302b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=62afef41277dfac37f515207ca73d33306e3302b
- https://www.wireshark.org/security/wnpa-sec-2017-05.html
- https://www.wireshark.org/security/wnpa-sec-2017-05.html
Modified: 2024-11-21
CVE-2017-6472
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an RTMPT dissector infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rtmpt.c by properly incrementing a certain sequence value.
- DSA-3811
- DSA-3811
- 96571
- 96571
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531
- https://www.wireshark.org/security/wnpa-sec-2017-04.html
- https://www.wireshark.org/security/wnpa-sec-2017-04.html
Modified: 2024-11-21
CVE-2017-6473
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser crash, triggered by a malformed capture file. This was addressed in wiretap/k12.c by validating the relationships between lengths and offsets.
- DSA-3811
- DSA-3811
- 96565
- 96565
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7edc761a01cda8e1b37677f673985582330317d2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7edc761a01cda8e1b37677f673985582330317d2
- https://www.wireshark.org/security/wnpa-sec-2017-09.html
- https://www.wireshark.org/security/wnpa-sec-2017-09.html
Modified: 2024-11-21
CVE-2017-6474
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating record sizes.
- DSA-3811
- DSA-3811
- 96566
- 96566
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47
- https://www.wireshark.org/security/wnpa-sec-2017-07.html
- https://www.wireshark.org/security/wnpa-sec-2017-07.html
Modified: 2024-11-21
CVE-2017-7700
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size.
- 97631
- 97631
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13478
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13478
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8fc0af859de4993951a915ad735be350221f3f53
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8fc0af859de4993951a915ad735be350221f3f53
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-14.html
- https://www.wireshark.org/security/wnpa-sec-2017-14.html
Modified: 2024-11-21
CVE-2017-7701
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type.
- 97632
- 97632
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13557
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13557
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=fa31f69b407436d0946f84baa0acdcc50962bf7a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=fa31f69b407436d0946f84baa0acdcc50962bf7a
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-16.html
- https://www.wireshark.org/security/wnpa-sec-2017-16.html
Modified: 2024-11-21
CVE-2017-7702
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.
- 97633
- 97633
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13477
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13477
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2f322f66cbcca2fefdaa630494f9d6c97eb659b7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2f322f66cbcca2fefdaa630494f9d6c97eb659b7
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-13.html
- https://www.wireshark.org/security/wnpa-sec-2017-13.html
Modified: 2024-11-21
CVE-2017-7703
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly.
- 97636
- 97636
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13466
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13466
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=671e32820ab29d41d712cc8a472eab9b672684d9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=671e32820ab29d41d712cc8a472eab9b672684d9
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-12.html
- https://www.wireshark.org/security/wnpa-sec-2017-12.html
Modified: 2024-11-21
CVE-2017-7704
In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.
- 97634
- 97634
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13453
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13453
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6032b0fe5fc1176ab77e03e20765f95fbd21b19e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6032b0fe5fc1176ab77e03e20765f95fbd21b19e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=da53a90b6895e47e03c5de05edf84bd99d535fd8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=da53a90b6895e47e03c5de05edf84bd99d535fd8
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-17.html
- https://www.wireshark.org/security/wnpa-sec-2017-17.html
Modified: 2024-11-21
CVE-2017-7705
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset.
- 97630
- 97630
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13558
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13558
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=08d392bbecc8fb666bf979e70a34536007b83ea2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=08d392bbecc8fb666bf979e70a34536007b83ea2
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-15.html
- https://www.wireshark.org/security/wnpa-sec-2017-15.html
Modified: 2024-11-21
CVE-2017-7745
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check.
- 97627
- 97627
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13578
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13578
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=acd8e1a9b17ad274bea1e01e10e4481508a1cbf0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=acd8e1a9b17ad274bea1e01e10e4481508a1cbf0
- https://www.wireshark.org/security/wnpa-sec-2017-20.html
- https://www.wireshark.org/security/wnpa-sec-2017-20.html
Modified: 2024-11-21
CVE-2017-7746
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length.
- 97635
- 97635
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13576
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13576
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=58e69cc769dea24b721abd8a29f9eedc11024b7e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=58e69cc769dea24b721abd8a29f9eedc11024b7e
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-19.html
- https://www.wireshark.org/security/wnpa-sec-2017-19.html
Modified: 2024-11-21
CVE-2017-7747
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree.
- 97638
- 97638
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13559
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13559
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5cfd52d6629cf8a7ab67c6bacd3431a964f43584
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5cfd52d6629cf8a7ab67c6bacd3431a964f43584
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-18.html
- https://www.wireshark.org/security/wnpa-sec-2017-18.html
Modified: 2024-11-21
CVE-2017-7748
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check.
- 97628
- 97628
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13581
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13581
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f55cbcde2c8f74b652add4450b0592082eb6acff
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f55cbcde2c8f74b652add4450b0592082eb6acff
- https://www.wireshark.org/security/wnpa-sec-2017-21.html
- https://www.wireshark.org/security/wnpa-sec-2017-21.html
Modified: 2024-11-21
CVE-2017-9343
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the MSNIP dissector misuses a NULL pointer. This was addressed in epan/dissectors/packet-msnip.c by validating an IPv4 address.
- 98797
- 98797
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1678
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1678
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13725
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13725
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=27556320b41904716b9c9f73ef8f4fe705d1e669
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=27556320b41904716b9c9f73ef8f4fe705d1e669
- https://www.wireshark.org/security/wnpa-sec-2017-30.html
- https://www.wireshark.org/security/wnpa-sec-2017-30.html
Modified: 2024-11-21
CVE-2017-9344
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bluetooth L2CAP dissector could divide by zero. This was addressed in epan/dissectors/packet-btl2cap.c by validating an interval value.
- 98796
- 98796
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1539
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1539
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6308ae03d82a29a2e3d75e1c325c8a9f6c44dcdf
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6308ae03d82a29a2e3d75e1c325c8a9f6c44dcdf
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-29.html
- https://www.wireshark.org/security/wnpa-sec-2017-29.html
Modified: 2024-11-21
CVE-2017-9345
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers.
- 98798
- 98798
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1206
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1206
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e280c9b637327a65d132bfe72d917b87e6844eb5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e280c9b637327a65d132bfe72d917b87e6844eb5
- https://www.wireshark.org/security/wnpa-sec-2017-26.html
- https://www.wireshark.org/security/wnpa-sec-2017-26.html
Modified: 2024-11-21
CVE-2017-9346
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit.
- 98799
- 98799
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1200
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1200
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13631
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13631
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c0bd15bd46a95c5b7dce02fe23c594429bb6c7e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c0bd15bd46a95c5b7dce02fe23c594429bb6c7e
- https://www.wireshark.org/security/wnpa-sec-2017-25.html
- https://www.wireshark.org/security/wnpa-sec-2017-25.html
Modified: 2024-11-21
CVE-2017-9347
In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.
- 98800
- 98800
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1216
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1216
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=278e52f26e7e1a23f8d2e8ed98693328c992bdce
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=278e52f26e7e1a23f8d2e8ed98693328c992bdce
- 42124
- 42124
- https://www.wireshark.org/security/wnpa-sec-2017-31.html
- https://www.wireshark.org/security/wnpa-sec-2017-31.html
Modified: 2024-11-21
CVE-2017-9348
In Wireshark 2.2.0 to 2.2.6, the DOF dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-dof.c by validating a size value.
- 98801
- 98801
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1151
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1151
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7fe55f96672b7bf2b4ceb9ae039a0f43eddd3151
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7fe55f96672b7bf2b4ceb9ae039a0f43eddd3151
- https://www.wireshark.org/security/wnpa-sec-2017-23.html
- https://www.wireshark.org/security/wnpa-sec-2017-23.html
Modified: 2024-11-21
CVE-2017-9349
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.
- 98803
- 98803
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1329
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1329
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13685
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13685
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb1b6494c44c9e939d9e2554de6b812de395e3f9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb1b6494c44c9e939d9e2554de6b812de395e3f9
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-27.html
- https://www.wireshark.org/security/wnpa-sec-2017-27.html
Modified: 2024-11-21
CVE-2017-9350
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by checking for a negative length.
- 98806
- 98806
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1212
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1212
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dbc7cb0bbdd501fa96e0cb98668f6d6bf17ac4e6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dbc7cb0bbdd501fa96e0cb98668f6d6bf17ac4e6
- https://www.wireshark.org/security/wnpa-sec-2017-28.html
- https://www.wireshark.org/security/wnpa-sec-2017-28.html
Modified: 2024-11-21
CVE-2017-9351
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.
- 98808
- 98808
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1153
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1153
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1183
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1183
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6e033c14da13bd5f72dfe07a347586517639d12
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6e033c14da13bd5f72dfe07a347586517639d12
- https://www.wireshark.org/security/wnpa-sec-2017-24.html
- https://www.wireshark.org/security/wnpa-sec-2017-24.html
Modified: 2024-11-21
CVE-2017-9352
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur.
- 98804
- 98804
- 1038612
- 1038612
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13599
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13599
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8c5e0cee278ff0678b0ebf4b9c2a614974b4029a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8c5e0cee278ff0678b0ebf4b9c2a614974b4029a
- https://www.wireshark.org/security/wnpa-sec-2017-22.html
- https://www.wireshark.org/security/wnpa-sec-2017-22.html
Modified: 2024-11-21
CVE-2017-9353
In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed in epan/dissectors/packet-ipv6.c by validating an IPv6 address.
- 98805
- 98805
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1303
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1303
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13675
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13675
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40b2d475c2ad550c1a0f536d5eb30f2a7404c4f0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40b2d475c2ad550c1a0f536d5eb30f2a7404c4f0
- 42123
- 42123
- https://www.wireshark.org/security/wnpa-sec-2017-33.html
- https://www.wireshark.org/security/wnpa-sec-2017-33.html
Modified: 2024-11-21
CVE-2017-9354
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the RGMP dissector could crash. This was addressed in epan/dissectors/packet-rgmp.c by validating an IPv4 address.
- 98802
- 98802
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1243
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1243
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3a77395e651acd81eb41ffd8fbdbf711e1133d76
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3a77395e651acd81eb41ffd8fbdbf711e1133d76
- https://www.wireshark.org/security/wnpa-sec-2017-32.html
- https://www.wireshark.org/security/wnpa-sec-2017-32.html