ALT-PU-2019-1078-1
Closed vulnerabilities
BDU:2019-01550
Уязвимость в диссекторе для протокола 6LoWPAN программы-анализатора сетевого трафика Wireshark, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01551
Уязвимость в диссекторе для протокола P_MUL программы-анализатора сетевого трафика Wireshark, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01558
Уязвимость диссектора RTSE программы-анализатора трафика Wireshark, связанная с чтением за границами буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01559
Уязвимость диссектора ISAKMP программы-анализатора трафика Wireshark, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-5716
In Wireshark 2.6.0 to 2.6.5, the 6LoWPAN dissector could crash. This was addressed in epan/dissectors/packet-6lowpan.c by avoiding use of a TVB before its creation.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106482
- 106482
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15217
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15217
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b2eea1793dbff813896e1ae9dff1bedb39ee010
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b2eea1793dbff813896e1ae9dff1bedb39ee010
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-01.html
- https://www.wireshark.org/security/wnpa-sec-2019-01.html
Modified: 2024-11-21
CVE-2019-5717
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106482
- 106482
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15337
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15337
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bf9272a92f3df1e4ccfaad434e123222ae5313f7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bf9272a92f3df1e4ccfaad434e123222ae5313f7
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-02.html
- https://www.wireshark.org/security/wnpa-sec-2019-02.html
Modified: 2024-11-21
CVE-2019-5718
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the RTSE dissector and other ASN.1 dissectors could crash. This was addressed in epan/charsets.c by adding a get_t61_string length check.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106482
- 106482
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cd09cb5cfb673beca3cce20b1d6a9bc67a134ae1
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cd09cb5cfb673beca3cce20b1d6a9bc67a134ae1
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.wireshark.org/security/wnpa-sec-2019-03.html
- https://www.wireshark.org/security/wnpa-sec-2019-03.html
Modified: 2024-11-21
CVE-2019-5719
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the ISAKMP dissector could crash. This was addressed in epan/dissectors/packet-isakmp.c by properly handling the case of a missing decryption data block.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15374
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15374
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b5b02f2a9b8772d8814096f86c60a32889d61f2c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b5b02f2a9b8772d8814096f86c60a32889d61f2c
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-04.html
- https://www.wireshark.org/security/wnpa-sec-2019-04.html