ALT-PU-2015-1462-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-3808
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- 74628
- 74628
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3809
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not properly track the current offset, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3277
- DSA-3277
- 74632
- 74632
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3810
epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74629
- 74629
- http://www.wireshark.org/security/wnpa-sec-2015-13.html
- http://www.wireshark.org/security/wnpa-sec-2015-13.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10989
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10989
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4ee6bcbd2e03a25f1e6b0239558d9edeaf8040c0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4ee6bcbd2e03a25f1e6b0239558d9edeaf8040c0
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3811
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
- RHSA-2017:0631
- RHSA-2017:0631
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.wireshark.org/security/wnpa-sec-2015-14.html
- http://www.wireshark.org/security/wnpa-sec-2015-14.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6fc6aa0b4efc1a1c3d7a2e3b5189e888fb6ccc2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6fc6aa0b4efc1a1c3d7a2e3b5189e888fb6ccc2
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3812
Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
- RHSA-2017:0631
- RHSA-2017:0631
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74637
- 74637
- http://www.wireshark.org/security/wnpa-sec-2015-15.html
- http://www.wireshark.org/security/wnpa-sec-2015-15.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8ccc2a6add29823a0ff0492fc50372449007e7b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8ccc2a6add29823a0ff0492fc50372449007e7b
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3813
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
- RHSA-2017:0631
- RHSA-2017:0631
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74633
- 74633
- http://www.wireshark.org/security/wnpa-sec-2015-16.html
- http://www.wireshark.org/security/wnpa-sec-2015-16.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11129
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11129
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35f2ccb4433718416551cc7a85afb0860529d57
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35f2ccb4433718416551cc7a85afb0860529d57
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3814
The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 74631
- 74631
- http://www.wireshark.org/security/wnpa-sec-2015-17.html
- http://www.wireshark.org/security/wnpa-sec-2015-17.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e243b0041328980a9bbd43bb8a8166d7422f9096
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e243b0041328980a9bbd43bb8a8166d7422f9096
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3815
The detect_version function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not check the length of the payload, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a packet with a crafted payload, as demonstrated by a length of zero, a different vulnerability than CVE-2015-3906.
- DSA-3277
- DSA-3277
- 74630
- 74630
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html
- https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3906
The logcat_dump_text function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not properly handle a lack of \0 termination, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted message in a packet, a different vulnerability than CVE-2015-3815.
- 74837
- 74837
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- GLSA-201510-03
- GLSA-201510-03