ALT-PU-2017-1260-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-6014
In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
Modified: 2024-11-21
CVE-2017-6467
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a Netscaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by changing the restrictions on file size.
- DSA-3811
- DSA-3811
- 96561
- 96561
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=284ad58d288722a8725401967bff0c4455488f0c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=284ad58d288722a8725401967bff0c4455488f0c
- https://www.wireshark.org/security/wnpa-sec-2017-11.html
- https://www.wireshark.org/security/wnpa-sec-2017-11.html
Modified: 2024-11-21
CVE-2017-6468
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser crash, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating the relationship between pages and records.
- DSA-3811
- DSA-3811
- 96569
- 96569
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf
- https://www.wireshark.org/security/wnpa-sec-2017-08.html
- https://www.wireshark.org/security/wnpa-sec-2017-08.html
Modified: 2024-11-21
CVE-2017-6469
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an LDSS dissector crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-ldss.c by ensuring that memory is allocated for a certain data structure.
- DSA-3811
- DSA-3811
- 96577
- 96577
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f753c127082d5e28abf482d6d175cbfee6661f7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f753c127082d5e28abf482d6d175cbfee6661f7
- https://www.wireshark.org/security/wnpa-sec-2017-03.html
- https://www.wireshark.org/security/wnpa-sec-2017-03.html
Modified: 2024-11-21
CVE-2017-6470
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an IAX2 infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-iax2.c by constraining packet lateness.
- DSA-3811
- DSA-3811
- 96563
- 96563
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0b89174ef4c531a1917437fff586fe525ee7bf2d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0b89174ef4c531a1917437fff586fe525ee7bf2d
- https://www.wireshark.org/security/wnpa-sec-2017-10.html
- https://www.wireshark.org/security/wnpa-sec-2017-10.html
Modified: 2024-11-21
CVE-2017-6471
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a WSP infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by validating the capability length.
- DSA-3811
- DSA-3811
- 96564
- 96564
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=62afef41277dfac37f515207ca73d33306e3302b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=62afef41277dfac37f515207ca73d33306e3302b
- https://www.wireshark.org/security/wnpa-sec-2017-05.html
- https://www.wireshark.org/security/wnpa-sec-2017-05.html
Modified: 2024-11-21
CVE-2017-6472
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an RTMPT dissector infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rtmpt.c by properly incrementing a certain sequence value.
- DSA-3811
- DSA-3811
- 96571
- 96571
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531
- https://www.wireshark.org/security/wnpa-sec-2017-04.html
- https://www.wireshark.org/security/wnpa-sec-2017-04.html
Modified: 2024-11-21
CVE-2017-6473
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser crash, triggered by a malformed capture file. This was addressed in wiretap/k12.c by validating the relationships between lengths and offsets.
- DSA-3811
- DSA-3811
- 96565
- 96565
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7edc761a01cda8e1b37677f673985582330317d2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7edc761a01cda8e1b37677f673985582330317d2
- https://www.wireshark.org/security/wnpa-sec-2017-09.html
- https://www.wireshark.org/security/wnpa-sec-2017-09.html
Modified: 2024-11-21
CVE-2017-6474
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating record sizes.
- DSA-3811
- DSA-3811
- 96566
- 96566
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47
- https://www.wireshark.org/security/wnpa-sec-2017-07.html
- https://www.wireshark.org/security/wnpa-sec-2017-07.html