ALT-PU-2018-1549-1
Closed vulnerabilities
BDU:2019-00923
Уязвимость LBMPDM диссектора анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00924
Уязвимость MMSE диссектора анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00959
Уязвимость компонента IxVeriWave анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01258
Уязвимость программы-анализатора трафика Wireshark, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01272
Уязвимость программы-анализатора трафика Wireshark, связанная с чтением за пределами границ в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01273
Уязвимость программы-анализатора трафика Wireshark, связанная с чтением за пределами границ в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01351
Уязвимость диссектора RPCAP (epan/dissectors/packet-rpcap.c) анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01551
Уязвимость в диссекторе для протокола P_MUL программы-анализатора сетевого трафика Wireshark, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01558
Уязвимость диссектора RTSE программы-анализатора трафика Wireshark, связанная с чтением за границами буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01559
Уязвимость диссектора ISAKMP программы-анализатора трафика Wireshark, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01573
Уязвимость компонента TCAP диссектора анализатора трафика компьютерных сетей Wireshark, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01574
Уязвимость компонента ASN.1 BER диссектора анализатора трафика компьютерных сетей Wireshark, связанная с выходом операции за границы памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02569
Уязвимость функции disct_gssapi_work (packet-gssapi.c) анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02570
Уязвимость модуля NetScaler (Netscaler.c) анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02571
Уязвимость компонента DOF Dissector анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02572
Уязвимость службы Service Location Protocol анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02573
Уязвимость службы Local Download Sharing Service анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02574
Уязвимость в диссекторе протокола Microsoft Spool Subsystem анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02717
Уязвимость диссектора ENIP анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01494
Уязвимость диссектора ASN.1 BER анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01495
Уязвимость компонента dissection engine анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-11356
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-29.html
- https://www.wireshark.org/security/wnpa-sec-2018-29.html
Modified: 2024-11-21
CVE-2018-11357
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-28.html
- https://www.wireshark.org/security/wnpa-sec-2018-28.html
Modified: 2024-11-21
CVE-2018-11358
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-31.html
- https://www.wireshark.org/security/wnpa-sec-2018-31.html
Modified: 2024-11-21
CVE-2018-11359
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the RRC dissector and other dissectors could crash. This was addressed in epan/proto.c by avoiding a NULL pointer dereference.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-33.html
- https://www.wireshark.org/security/wnpa-sec-2018-33.html
Modified: 2024-11-21
CVE-2018-11360
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the GSM A DTAP dissector could crash. This was addressed in epan/dissectors/packet-gsm_a_dtap.c by fixing an off-by-one error that caused a buffer overflow.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-30.html
- https://www.wireshark.org/security/wnpa-sec-2018-30.html
Modified: 2024-11-21
CVE-2018-11362
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\0' character.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-25.html
- https://www.wireshark.org/security/wnpa-sec-2018-25.html
Modified: 2024-11-21
CVE-2018-14339
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14738
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14738
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b77c0a596a8071aebc1de71e3f79e5e15e919ca
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b77c0a596a8071aebc1de71e3f79e5e15e919ca
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-38.html
- https://www.wireshark.org/security/wnpa-sec-2018-38.html
Modified: 2024-11-21
CVE-2018-14340
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14675
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14675
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=672d882a53f96730e4ef1e5b1639c585823b0df8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=672d882a53f96730e4ef1e5b1639c585823b0df8
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-36.html
- https://www.wireshark.org/security/wnpa-sec-2018-36.html
Modified: 2024-11-21
CVE-2018-14341
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14742
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14742
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2e716c32be6aa20e1813b0002878853e71f8b2f4
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2e716c32be6aa20e1813b0002878853e71f8b2f4
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-39.html
- https://www.wireshark.org/security/wnpa-sec-2018-39.html
Modified: 2024-11-21
CVE-2018-14342
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13741
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13741
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=36af43dbb7673495948cd65d0346e8b9812b941c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=36af43dbb7673495948cd65d0346e8b9812b941c
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-34.html
- https://www.wireshark.org/security/wnpa-sec-2018-34.html
Modified: 2024-11-21
CVE-2018-14343
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14682
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14682
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9402f2f80c6bc7d25178a0875c5a1f5ee36361db
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9402f2f80c6bc7d25178a0875c5a1f5ee36361db
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-37.html
- https://www.wireshark.org/security/wnpa-sec-2018-37.html
Modified: 2024-11-21
CVE-2018-14344
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ISMP dissector could crash. This was addressed in epan/dissectors/packet-ismp.c by validating the IPX address length to avoid a buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14672
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14672
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f7153685b39a164aea09ba7f96ebb648b8328ae
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f7153685b39a164aea09ba7f96ebb648b8328ae
- https://www.wireshark.org/security/wnpa-sec-2018-35.html
- https://www.wireshark.org/security/wnpa-sec-2018-35.html
Modified: 2024-11-21
CVE-2018-14367
In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14966
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14966
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81ce5fcb3e37a0aaeb7532f7a2a09366f16fa310
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81ce5fcb3e37a0aaeb7532f7a2a09366f16fa310
- https://www.wireshark.org/security/wnpa-sec-2018-42.html
- https://www.wireshark.org/security/wnpa-sec-2018-42.html
Modified: 2024-11-21
CVE-2018-14368
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14841
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14841
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c44312f465014eb409d766a9828b7f101f6251c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c44312f465014eb409d766a9828b7f101f6251c
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-40.html
- https://www.wireshark.org/security/wnpa-sec-2018-40.html
Modified: 2024-11-21
CVE-2018-14369
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the HTTP2 dissector could crash. This was addressed in epan/dissectors/packet-http2.c by verifying that header data was found before proceeding to header decompression.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14869
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14869
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=038cd225bfa54e2a7ade4043118796334920a61e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=038cd225bfa54e2a7ade4043118796334920a61e
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-41.html
- https://www.wireshark.org/security/wnpa-sec-2018-41.html
Modified: 2024-11-21
CVE-2018-14370
In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/airpdcap.c via bounds checking that prevents a buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b1446124eebc3ea5591d18e719c2a5cff3630638
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b1446124eebc3ea5591d18e719c2a5cff3630638
- https://www.wireshark.org/security/wnpa-sec-2018-43.html
- https://www.wireshark.org/security/wnpa-sec-2018-43.html
Modified: 2024-11-21
CVE-2018-16056
In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth Attribute Protocol dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by verifying that a dissector for a specific UUID exists.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105174
- 105174
- 1041609
- 1041609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14994
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14994
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f98fbce64cb230e94a2cafc410a3cedad657b485
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f98fbce64cb230e94a2cafc410a3cedad657b485
- DSA-4315
- DSA-4315
- https://www.wireshark.org/security/wnpa-sec-2018-45.html
- https://www.wireshark.org/security/wnpa-sec-2018-45.html
Modified: 2024-11-21
CVE-2018-16057
In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105174
- 105174
- 1041609
- 1041609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15022
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15022
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bbf46eb46ae38392af8e6cd288795f0def50a621
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bbf46eb46ae38392af8e6cd288795f0def50a621
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4315
- DSA-4315
- https://www.wireshark.org/security/wnpa-sec-2018-46.html
- https://www.wireshark.org/security/wnpa-sec-2018-46.html
Modified: 2024-11-21
CVE-2018-16058
In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth AVDTP dissector could crash. This was addressed in epan/dissectors/packet-btavdtp.c by properly initializing a data structure.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105174
- 105174
- 1041609
- 1041609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14884
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14884
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c48d6a6d60c5c9111838a945966b6cb8750777be
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c48d6a6d60c5c9111838a945966b6cb8750777be
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4315
- DSA-4315
- https://www.wireshark.org/security/wnpa-sec-2018-44.html
- https://www.wireshark.org/security/wnpa-sec-2018-44.html
Modified: 2024-11-21
CVE-2018-18227
In Wireshark 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9, the MS-WSP protocol dissector could crash. This was addressed in epan/dissectors/packet-mswsp.c by properly handling NULL return values.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105583
- 105583
- 1041909
- 1041909
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15119
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15119
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d443be449a52f95df5754adc39e1f3472fec2f03
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d443be449a52f95df5754adc39e1f3472fec2f03
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-47.html
- https://www.wireshark.org/security/wnpa-sec-2018-47.html
Modified: 2024-11-21
CVE-2018-19622
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15250
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15250
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b7555d32d11862f0e500ec466ad6bfe54190076
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b7555d32d11862f0e500ec466ad6bfe54190076
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-54.html
- https://www.wireshark.org/security/wnpa-sec-2018-54.html
Modified: 2024-11-21
CVE-2018-19623
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the LBMPDM dissector could crash. In addition, a remote attacker could write arbitrary data to any memory locations before the packet-scoped memory. This was addressed in epan/dissectors/packet-lbmpdm.c by disallowing certain negative values.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15132
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15132
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9c8645ec7b28e4d7193962ecd2a418613bf6a84f
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9c8645ec7b28e4d7193962ecd2a418613bf6a84f
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-53.html
- https://www.wireshark.org/security/wnpa-sec-2018-53.html
Modified: 2024-11-21
CVE-2018-19624
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the PVFS dissector could crash. This was addressed in epan/dissectors/packet-pvfs2.c by preventing a NULL pointer dereference.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3e319db1107b08fc3be804b6d449143ec9aa0dec
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3e319db1107b08fc3be804b6d449143ec9aa0dec
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-56.html
- https://www.wireshark.org/security/wnpa-sec-2018-56.html
Modified: 2024-11-21
CVE-2018-19625
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the dissection engine could crash. This was addressed in epan/tvbuff_composite.c by preventing a heap-based buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14466
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14466
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dc4d209f39132a4ae05675a11609176ae9705cfc
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dc4d209f39132a4ae05675a11609176ae9705cfc
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-51.html
- https://www.wireshark.org/security/wnpa-sec-2018-51.html
Modified: 2024-11-21
CVE-2018-19626
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the DCOM dissector could crash. This was addressed in epan/dissectors/packet-dcom.c by adding '\0' termination.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15130
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15130
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c5a65115ebab55cfd5ce0a855c2256e01cab6449
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c5a65115ebab55cfd5ce0a855c2256e01cab6449
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-52.html
- https://www.wireshark.org/security/wnpa-sec-2018-52.html
Modified: 2024-11-21
CVE-2018-19627
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by adjusting a buffer boundary.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bdc33cfaecb1b4cf2c114ed9015713ddf8569a60
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bdc33cfaecb1b4cf2c114ed9015713ddf8569a60
- DSA-4359
- DSA-4359
- 45951
- 45951
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-55.html
- https://www.wireshark.org/security/wnpa-sec-2018-55.html
Modified: 2024-11-21
CVE-2018-9256
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the LWAPP dissector could crash. This was addressed in epan/dissectors/packet-lwapp.c by limiting the encapsulation levels to restrict the recursion depth.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14467
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14467
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dac48f148538c706c446e5105d84ebcb54587528
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dac48f148538c706c446e5105d84ebcb54587528
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-20.html
- https://www.wireshark.org/security/wnpa-sec-2018-20.html
Modified: 2024-11-21
CVE-2018-9257
In Wireshark 2.4.0 to 2.4.5, the CQL dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-cql.c by checking for a nonzero number of columns.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14530
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14530
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d7a9501b0439a5dbf24016a95b4896170d789dc2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d7a9501b0439a5dbf24016a95b4896170d789dc2
- https://www.wireshark.org/security/wnpa-sec-2018-22.html
- https://www.wireshark.org/security/wnpa-sec-2018-22.html
Modified: 2024-11-21
CVE-2018-9258
In Wireshark 2.4.0 to 2.4.5, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by preserving valid data sources.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14472
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14472
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2d4695de1477df60b0188fd581c0c279db601978
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2d4695de1477df60b0188fd581c0c279db601978
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-21.html
- https://www.wireshark.org/security/wnpa-sec-2018-21.html
Modified: 2024-11-21
CVE-2018-9259
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the MP4 dissector could crash. This was addressed in epan/dissectors/file-mp4.c by restricting the box recursion depth.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13777
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2113179835b37549f245ac7c05ff2b96276893e4
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2113179835b37549f245ac7c05ff2b96276893e4
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-15.html
- https://www.wireshark.org/security/wnpa-sec-2018-15.html
Modified: 2024-11-21
CVE-2018-9260
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the IEEE 802.15.4 dissector could crash. This was addressed in epan/dissectors/packet-ieee802154.c by ensuring that an allocation step occurs.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14468
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14468
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=14d6f717d8ea27688af48532edb1d29f502ea8f0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=14d6f717d8ea27688af48532edb1d29f502ea8f0
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-17.html
- https://www.wireshark.org/security/wnpa-sec-2018-17.html
Modified: 2024-11-21
CVE-2018-9261
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the NBAP dissector could crash with a large loop that ends with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-nbap.c by prohibiting the self-linking of DCH-IDs.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14471
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14471
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66bc372716e04d6a8afdf6712583c9b5d11fee55
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66bc372716e04d6a8afdf6712583c9b5d11fee55
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-18.html
- https://www.wireshark.org/security/wnpa-sec-2018-18.html
Modified: 2024-11-21
CVE-2018-9262
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the VLAN dissector could crash. This was addressed in epan/dissectors/packet-vlan.c by limiting VLAN tag nesting to restrict the recursion depth.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14469
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14469
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f05c3b91f9571210b86576ee6284e71a3306109d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f05c3b91f9571210b86576ee6284e71a3306109d
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-19.html
- https://www.wireshark.org/security/wnpa-sec-2018-19.html
Modified: 2024-11-21
CVE-2018-9263
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the Kerberos dissector could crash. This was addressed in epan/dissectors/packet-kerberos.c by ensuring a nonzero key length.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14576
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14576
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4fe65168fd0de81306710330aa414f10f53cbdf0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4fe65168fd0de81306710330aa414f10f53cbdf0
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-23.html
- https://www.wireshark.org/security/wnpa-sec-2018-23.html
Modified: 2024-11-21
CVE-2018-9264
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the ADB dissector could crash with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-adb.c by checking for a length inconsistency.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14460
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14460
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0290a62be0fca8da9bb190f59dc1fe26c1d65024
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0290a62be0fca8da9bb190f59dc1fe26c1d65024
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-16.html
- https://www.wireshark.org/security/wnpa-sec-2018-16.html
Modified: 2024-11-21
CVE-2018-9265
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-tn3270.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14480
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14480
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b12cc581cd4878d74b6116ca02c7dbe650c1f242
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b12cc581cd4878d74b6116ca02c7dbe650c1f242
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9266
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-isup.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14481
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14481
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9d3714e767cb104dcfa1647935fa5960b16bb8e1
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9d3714e767cb104dcfa1647935fa5960b16bb8e1
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9267
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-lapd.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14482
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14482
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ed057f7faa709dbde34b91f0715a957837f74d9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ed057f7faa709dbde34b91f0715a957837f74d9
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9268
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-smb2.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14483
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14483
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c69d710d2bf39fe633800db65efddf55701131b6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c69d710d2bf39fe633800db65efddf55701131b6
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9269
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-giop.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14484
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14484
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e19aba33026212cbe000ece633adf14d109489fa
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e19aba33026212cbe000ece633adf14d109489fa
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9270
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/oids.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14485
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14485
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0fbc50f9b9219be54d6db47f04b65af19696a7c7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0fbc50f9b9219be54d6db47f04b65af19696a7c7
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9271
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-multipart.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14486
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14486
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5b0228945dc74ee82d2ab4a4e7af2bdfe7b75910
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5b0228945dc74ee82d2ab4a4e7af2bdfe7b75910
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9272
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-h223.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14487
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14487
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6e3b90824a82724f445a0374e99f0b76e4cf5e8b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6e3b90824a82724f445a0374e99f0b76e4cf5e8b
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9273
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-pcp.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14488
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14488
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1f8f1456f1e73b6c09e50a64749e43413ac12df7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1f8f1456f1e73b6c09e50a64749e43413ac12df7
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2018-9274
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, ui/failure_message.c has a memory leak.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14489
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14489
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=211845aba4794720ae265c782cdffddae54a3e7a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=211845aba4794720ae265c782cdffddae54a3e7a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f38e895dfc0d97bce64f73ce99df706911d9aa07
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f38e895dfc0d97bce64f73ce99df706911d9aa07
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
- https://www.wireshark.org/security/wnpa-sec-2018-24.html
Modified: 2024-11-21
CVE-2019-10894
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the GSS-API dissector could crash. This was addressed in epan/dissectors/packet-gssapi.c by ensuring that a valid dissector is called.
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1390
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 107834
- 107834
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15613
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15613
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b20e5d8aae2580e29c83ddaf0b6b2e640603e4aa
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b20e5d8aae2580e29c83ddaf0b6b2e640603e4aa
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1802-1] wireshark security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1802-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- FEDORA-2019-77b2d840ef
- FEDORA-2019-77b2d840ef
- FEDORA-2019-aef1dac6a0
- FEDORA-2019-aef1dac6a0
- USN-3986-1
- USN-3986-1
- https://www.wireshark.org/security/wnpa-sec-2019-14.html
- https://www.wireshark.org/security/wnpa-sec-2019-14.html
Modified: 2024-11-21
CVE-2019-10895
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the NetScaler file parser could crash. This was addressed in wiretap/netscaler.c by improving data validation.
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1390
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 107834
- 107834
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15497
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15497
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2fbbde780e5d5d82e31dca656217daf278cf62bb
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2fbbde780e5d5d82e31dca656217daf278cf62bb
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=38680c4c69f9f4e0f39e29b66fe2b02d88eb629d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=38680c4c69f9f4e0f39e29b66fe2b02d88eb629d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cab0cff6abdd7a5b5b0bfa4ee204eea951e129e9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cab0cff6abdd7a5b5b0bfa4ee204eea951e129e9
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1802-1] wireshark security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1802-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- FEDORA-2019-77b2d840ef
- FEDORA-2019-77b2d840ef
- FEDORA-2019-aef1dac6a0
- FEDORA-2019-aef1dac6a0
- USN-3986-1
- USN-3986-1
- https://www.wireshark.org/security/wnpa-sec-2019-09.html
- https://www.wireshark.org/security/wnpa-sec-2019-09.html
Modified: 2024-11-21
CVE-2019-10896
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DOF dissector could crash. This was addressed in epan/dissectors/packet-dof.c by properly handling generated IID and OID bytes.
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1390
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 107834
- 107834
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15617
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15617
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=441b6d9071d6341e58dfe10719375489c5b8e3f0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=441b6d9071d6341e58dfe10719375489c5b8e3f0
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- FEDORA-2019-77b2d840ef
- FEDORA-2019-77b2d840ef
- FEDORA-2019-aef1dac6a0
- FEDORA-2019-aef1dac6a0
- USN-3986-1
- USN-3986-1
- https://www.wireshark.org/security/wnpa-sec-2019-15.html
- https://www.wireshark.org/security/wnpa-sec-2019-15.html
Modified: 2024-11-21
CVE-2019-10899
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the SRVLOC dissector could crash. This was addressed in epan/dissectors/packet-srvloc.c by preventing a heap-based buffer under-read.
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1390
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 107834
- 107834
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15546
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15546
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b16fea2f175a3297edac118c8844c7987d31c1cb
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b16fea2f175a3297edac118c8844c7987d31c1cb
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1802-1] wireshark security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1802-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- FEDORA-2019-77b2d840ef
- FEDORA-2019-77b2d840ef
- FEDORA-2019-aef1dac6a0
- FEDORA-2019-aef1dac6a0
- USN-3986-1
- USN-3986-1
- https://www.wireshark.org/security/wnpa-sec-2019-10.html
- https://www.wireshark.org/security/wnpa-sec-2019-10.html
Modified: 2024-11-21
CVE-2019-10901
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by handling file digests properly.
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1390
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 107834
- 107834
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15620
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15620
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cf801a25074f76dc3ae62d8ec53ace75f56ce2cd
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cf801a25074f76dc3ae62d8ec53ace75f56ce2cd
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1802-1] wireshark security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1802-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- FEDORA-2019-77b2d840ef
- FEDORA-2019-77b2d840ef
- FEDORA-2019-aef1dac6a0
- FEDORA-2019-aef1dac6a0
- USN-3986-1
- USN-3986-1
- https://www.wireshark.org/security/wnpa-sec-2019-17.html
- https://www.wireshark.org/security/wnpa-sec-2019-17.html
Modified: 2024-11-21
CVE-2019-10903
In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DCERPC SPOOLSS dissector could crash. This was addressed in epan/dissectors/packet-dcerpc-spoolss.c by adding a boundary check.
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1356
- openSUSE-SU-2019:1390
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 107834
- 107834
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15568
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eafdcfa4b6d5187a5326442a82608ab03d9dddcb
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eafdcfa4b6d5187a5326442a82608ab03d9dddcb
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1802-1] wireshark security update
- [debian-lts-announce] 20190525 [SECURITY] [DLA 1802-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- FEDORA-2019-77b2d840ef
- FEDORA-2019-77b2d840ef
- FEDORA-2019-aef1dac6a0
- FEDORA-2019-aef1dac6a0
- USN-3986-1
- USN-3986-1
- https://www.wireshark.org/security/wnpa-sec-2019-18.html
- https://www.wireshark.org/security/wnpa-sec-2019-18.html
Modified: 2024-11-21
CVE-2019-12295
In Wireshark 3.0.0 to 3.0.1, 2.6.0 to 2.6.8, and 2.4.0 to 2.4.14, the dissection engine could crash. This was addressed in epan/packet.c by restricting the number of layers and consequently limiting recursion.
- 108464
- 108464
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15778
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15778
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7b6e197da4c497e229ed3ebf6952bae5c426a820
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7b6e197da4c497e229ed3ebf6952bae5c426a820
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- https://support.f5.com/csp/article/K06725231
- https://support.f5.com/csp/article/K06725231
- https://support.f5.com/csp/article/K06725231?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K06725231?utm_source=f5support&%3Butm_medium=RSS
- USN-4133-1
- USN-4133-1
- https://www.wireshark.org/security/wnpa-sec-2019-19.html
- https://www.wireshark.org/security/wnpa-sec-2019-19.html
Modified: 2024-11-21
CVE-2019-13619
In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ASN.1 BER dissector and related dissectors could crash. This was addressed in epan/asn1.c by properly restricting buffer increments.
- openSUSE-SU-2019:1965
- openSUSE-SU-2019:1965
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 109293
- 109293
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15870
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15870
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7e90aed666e809c0db5de9d1816802a7dcea28d9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7e90aed666e809c0db5de9d1816802a7dcea28d9
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- FEDORA-2019-70e93298e3
- FEDORA-2019-70e93298e3
- FEDORA-2019-23f7634765
- FEDORA-2019-23f7634765
- USN-4133-1
- USN-4133-1
- https://www.wireshark.org/security/wnpa-sec-2019-20.html
- https://www.wireshark.org/security/wnpa-sec-2019-20.html
Modified: 2024-11-21
CVE-2019-5717
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106482
- 106482
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15337
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15337
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bf9272a92f3df1e4ccfaad434e123222ae5313f7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bf9272a92f3df1e4ccfaad434e123222ae5313f7
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-02.html
- https://www.wireshark.org/security/wnpa-sec-2019-02.html
Modified: 2024-11-21
CVE-2019-5718
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the RTSE dissector and other ASN.1 dissectors could crash. This was addressed in epan/charsets.c by adding a get_t61_string length check.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106482
- 106482
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cd09cb5cfb673beca3cce20b1d6a9bc67a134ae1
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cd09cb5cfb673beca3cce20b1d6a9bc67a134ae1
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.wireshark.org/security/wnpa-sec-2019-03.html
- https://www.wireshark.org/security/wnpa-sec-2019-03.html
Modified: 2024-11-21
CVE-2019-5719
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the ISAKMP dissector could crash. This was addressed in epan/dissectors/packet-isakmp.c by properly handling the case of a missing decryption data block.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15374
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15374
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b5b02f2a9b8772d8814096f86c60a32889d61f2c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b5b02f2a9b8772d8814096f86c60a32889d61f2c
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-04.html
- https://www.wireshark.org/security/wnpa-sec-2019-04.html
Modified: 2024-11-21
CVE-2019-5721
In Wireshark 2.4.0 to 2.4.11, the ENIP dissector could crash. This was addressed in epan/dissectors/packet-enip.c by changing the memory-management approach so that a use-after-free is avoided.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14470
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14470
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1c66174ec7aa19e2ddc79178cf59f15a654fc4fe
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1c66174ec7aa19e2ddc79178cf59f15a654fc4fe
- https://www.wireshark.org/security/wnpa-sec-2019-05.html
- https://www.wireshark.org/security/wnpa-sec-2019-05.html
Modified: 2024-11-21
CVE-2019-9208
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash. This was addressed in epan/dissectors/asn1/tcap/tcap.cnf by avoiding NULL pointer dereferences.
- openSUSE-SU-2019:1108
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- 107203
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15464
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3d1b8004ed3a07422ca5d4e4ee8097150b934fd2
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- USN-3986-1
- DSA-4416
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.wireshark.org/security/wnpa-sec-2019-07.html
- openSUSE-SU-2019:1108
- https://www.wireshark.org/security/wnpa-sec-2019-07.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- DSA-4416
- USN-3986-1
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3d1b8004ed3a07422ca5d4e4ee8097150b934fd2
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15464
- 107203
- openSUSE-SU-2020:0362
- openSUSE-SU-2019:1390
Modified: 2024-11-21
CVE-2019-9209
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.
- openSUSE-SU-2019:1108
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- 107203
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f8fbe9f934d65b2694fa74622e5eb2e1dc8cd20b
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- USN-3986-1
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-06.html
- openSUSE-SU-2019:1108
- https://www.wireshark.org/security/wnpa-sec-2019-06.html
- DSA-4416
- USN-3986-1
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f8fbe9f934d65b2694fa74622e5eb2e1dc8cd20b
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447
- 107203
- openSUSE-SU-2020:0362
- openSUSE-SU-2019:1390
Modified: 2024-11-21
CVE-2019-9214
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.
- openSUSE-SU-2019:1108
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- 107203
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15536
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c557bb0910be271e49563756411a690a1bc53ce5
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- USN-3986-1
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-08.html
- openSUSE-SU-2019:1108
- https://www.wireshark.org/security/wnpa-sec-2019-08.html
- DSA-4416
- USN-3986-1
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c557bb0910be271e49563756411a690a1bc53ce5
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15536
- 107203
- openSUSE-SU-2020:0362
- openSUSE-SU-2019:1390