ALT-PU-2019-3139-1
Closed vulnerabilities
BDU:2021-01494
Уязвимость диссектора ASN.1 BER анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01495
Уязвимость компонента dissection engine анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-00269
Уязвимость программы для анализа трафика wireshark, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12295
In Wireshark 3.0.0 to 3.0.1, 2.6.0 to 2.6.8, and 2.4.0 to 2.4.14, the dissection engine could crash. This was addressed in epan/packet.c by restricting the number of layers and consequently limiting recursion.
- 108464
- 108464
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15778
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15778
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7b6e197da4c497e229ed3ebf6952bae5c426a820
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7b6e197da4c497e229ed3ebf6952bae5c426a820
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2423-1] wireshark security update
- https://support.f5.com/csp/article/K06725231
- https://support.f5.com/csp/article/K06725231
- https://support.f5.com/csp/article/K06725231?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K06725231?utm_source=f5support&%3Butm_medium=RSS
- USN-4133-1
- USN-4133-1
- https://www.wireshark.org/security/wnpa-sec-2019-19.html
- https://www.wireshark.org/security/wnpa-sec-2019-19.html
Modified: 2024-11-21
CVE-2019-13619
In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ASN.1 BER dissector and related dissectors could crash. This was addressed in epan/asn1.c by properly restricting buffer increments.
- openSUSE-SU-2019:1965
- openSUSE-SU-2019:1965
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 109293
- 109293
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15870
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15870
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7e90aed666e809c0db5de9d1816802a7dcea28d9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7e90aed666e809c0db5de9d1816802a7dcea28d9
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- FEDORA-2019-70e93298e3
- FEDORA-2019-70e93298e3
- FEDORA-2019-23f7634765
- FEDORA-2019-23f7634765
- USN-4133-1
- USN-4133-1
- https://www.wireshark.org/security/wnpa-sec-2019-20.html
- https://www.wireshark.org/security/wnpa-sec-2019-20.html
Modified: 2024-11-21
CVE-2019-16319
In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=02ddd49885c6a09e936a76aceb726ed06539704a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=02ddd49885c6a09e936a76aceb726ed06539704a
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2019-21.html
- https://www.wireshark.org/security/wnpa-sec-2019-21.html