ALT-PU-2015-1264-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-2187
The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial of service (stack memory corruption and application crash) via a crafted packet.
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- 72940
- 72940
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-06.html
- http://www.wireshark.org/security/wnpa-sec-2015-06.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9952
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9952
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1a3dd349233a4ee3e69295c8e79f9a216027037e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1a3dd349233a4ee3e69295c8e79f9a216027037e
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-2188
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
- http://advisories.mageia.org/MGASA-2015-0117.html
- http://advisories.mageia.org/MGASA-2015-0117.html
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- DSA-3210
- DSA-3210
- MDVSA-2015:183
- MDVSA-2015:183
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72942
- 72942
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-07.html
- http://www.wireshark.org/security/wnpa-sec-2015-07.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10844
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10844
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b204ff4846fe84b7789893c6b1d9afbdecac5b5d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b204ff4846fe84b7789893c6b1d9afbdecac5b5d
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-2189
Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
- http://advisories.mageia.org/MGASA-2015-0117.html
- http://advisories.mageia.org/MGASA-2015-0117.html
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- RHSA-2015:1460
- RHSA-2015:1460
- DSA-3210
- DSA-3210
- MDVSA-2015:183
- MDVSA-2015:183
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72944
- 72944
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-08.html
- http://www.wireshark.org/security/wnpa-sec-2015-08.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a835c85e3d662343d7283f1dcdacb8a11d1d0727
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a835c85e3d662343d7283f1dcdacb8a11d1d0727
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-2190
epan/proto.c in Wireshark 1.12.x before 1.12.4 does not properly handle integer data types greater than 32 bits in size, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet that is improperly handled by the LLDP dissector.
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72938
- 72938
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-09.html
- http://www.wireshark.org/security/wnpa-sec-2015-09.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10983
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10983
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d1865e000ebedf49fc0d9f221a11d6af74360837
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d1865e000ebedf49fc0d9f221a11d6af74360837
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-2191
Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
- http://advisories.mageia.org/MGASA-2015-0117.html
- http://advisories.mageia.org/MGASA-2015-0117.html
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- RHSA-2015:1460
- RHSA-2015:1460
- DSA-3210
- DSA-3210
- MDVSA-2015:183
- MDVSA-2015:183
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72941
- 72941
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-10.html
- http://www.wireshark.org/security/wnpa-sec-2015-10.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=608cf324b3962877e9699f3e81e8f82ac9f1ea14
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=608cf324b3962877e9699f3e81e8f82ac9f1ea14
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-2192
Integer overflow in the dissect_osd2_cdb_continuation function in epan/dissectors/packet-scsi-osd.c in the SCSI OSD dissector in Wireshark 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- 72937
- 72937
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-11.html
- http://www.wireshark.org/security/wnpa-sec-2015-11.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11024
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11024
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35ca6c051adb28c321db54cc138f18637977c9a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35ca6c051adb28c321db54cc138f18637977c9a
- GLSA-201510-03
- GLSA-201510-03