ALT-PU-2020-2896-1
Closed vulnerabilities
BDU:2021-00874
Уязвимость анализатора протокола BLIP программного обеспечения Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00875
Уязвимость программного обеспечения Wireshark, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2021-00884
Уязвимость функции в epan/dissectors/packet-tcp.c программного обеспечения Wireshark, позволяющая нарушителю вызвать аварийное завершение работы приложения
Modified: 2024-11-21
CVE-2020-25862
In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1882
- openSUSE-SU-2020:1882
- https://gitlab.com/wireshark/wireshark/-/commit/7f3fe6164a68b76d9988c4253b24d43f498f1753
- https://gitlab.com/wireshark/wireshark/-/commit/7f3fe6164a68b76d9988c4253b24d43f498f1753
- https://gitlab.com/wireshark/wireshark/-/issues/16816
- https://gitlab.com/wireshark/wireshark/-/issues/16816
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1b390bec14
- FEDORA-2020-1b390bec14
- FEDORA-2020-9bda6ae1cd
- FEDORA-2020-9bda6ae1cd
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.wireshark.org/security/wnpa-sec-2020-12.html
- https://www.wireshark.org/security/wnpa-sec-2020-12.html
Modified: 2024-11-21
CVE-2020-25863
In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the MIME Multipart dissector could crash. This was addressed in epan/dissectors/packet-multipart.c by correcting the deallocation of invalid MIME parts.
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1882
- openSUSE-SU-2020:1882
- https://gitlab.com/wireshark/wireshark/-/commit/5803c7b87b3414cdb8bf502af50bb406ca774482
- https://gitlab.com/wireshark/wireshark/-/commit/5803c7b87b3414cdb8bf502af50bb406ca774482
- https://gitlab.com/wireshark/wireshark/-/issues/16741
- https://gitlab.com/wireshark/wireshark/-/issues/16741
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1b390bec14
- FEDORA-2020-1b390bec14
- FEDORA-2020-9bda6ae1cd
- FEDORA-2020-9bda6ae1cd
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.wireshark.org/security/wnpa-sec-2020-11.html
- https://www.wireshark.org/security/wnpa-sec-2020-11.html
Modified: 2024-11-21
CVE-2020-25866
In Wireshark 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13, the BLIP protocol dissector has a NULL pointer dereference because a buffer was sized for compressed (not uncompressed) messages. This was addressed in epan/dissectors/packet-blip.c by allowing reasonable compression ratios and rejecting ZIP bombs.
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1882
- openSUSE-SU-2020:1882
- https://gitlab.com/wireshark/wireshark/-/commit/4a948427100b6c109f4ec7b4361f0d2aec5e5c3f
- https://gitlab.com/wireshark/wireshark/-/commit/4a948427100b6c109f4ec7b4361f0d2aec5e5c3f
- https://gitlab.com/wireshark/wireshark/-/issues/16866
- https://gitlab.com/wireshark/wireshark/-/issues/16866
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1bf4b97c16
- FEDORA-2020-1b390bec14
- FEDORA-2020-1b390bec14
- FEDORA-2020-9bda6ae1cd
- FEDORA-2020-9bda6ae1cd
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.wireshark.org/security/wnpa-sec-2020-13.html
- https://www.wireshark.org/security/wnpa-sec-2020-13.html