drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Wireshark
Name: |
Zwei Probleme in Wireshark |
|
ID: |
USN-4133-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 19.04 |
|
Datum: |
Mo, 16. September 2019, 07:34 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13619 |
|
Applikationen: |
Wireshark |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3419000826742033839== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="UP05sJCE7dJVurFeK4m4v8GnqiaQg4Tlj"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --UP05sJCE7dJVurFeK4m4v8GnqiaQg4Tlj Content-Type: multipart/mixed; boundary="OL1NzUwQzSYIV8acv5zDG14iK4uaSzTAD"; protected-headers="v1" From: Mike Salvatore <mike.salvatore@canonical.com> Reply-To: security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <cd8339ca-d24d-61b5-1b36-978750c343d0@canonical.com> Subject: [USN-4133-1] Wireshark vulnerabilities References: <20190916044343.4F23626C27B7@lillypilly.canonical.com> In-Reply-To: <20190916044343.4F23626C27B7@lillypilly.canonical.com>
--OL1NzUwQzSYIV8acv5zDG14iK4uaSzTAD Content-Type: text/plain; charset=utf-8 Content-Language: en-U Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4133-1 September 16, 2019
Wireshark vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Wireshark could be made to crash if it received specially crafted network traffic or input files.
Software Description: - wireshark: network traffic analyzer
Details:
It was discovered that Wireshark improperly handled certain input. A remote or local attacker could cause Wireshark to crash by injecting malformed packets onto the wire or convincing someone to read a malformed packet trace file.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04: libwireshark-data 2.6.10-1~ubuntu19.04.0 libwireshark11 2.6.10-1~ubuntu19.04.0 libwiretap8 2.6.10-1~ubuntu19.04.0 libwscodecs2 2.6.10-1~ubuntu19.04.0 libwsutil9 2.6.10-1~ubuntu19.04.0 tshark 2.6.10-1~ubuntu19.04.0 wireshark 2.6.10-1~ubuntu19.04.0 wireshark-common 2.6.10-1~ubuntu19.04.0 wireshark-gtk 2.6.10-1~ubuntu19.04.0 wireshark-qt 2.6.10-1~ubuntu19.04.0
Ubuntu 18.04 LTS: libwireshark-data 2.6.10-1~ubuntu18.04.0 libwireshark11 2.6.10-1~ubuntu18.04.0 libwiretap8 2.6.10-1~ubuntu18.04.0 libwscodecs2 2.6.10-1~ubuntu18.04.0 libwsutil9 2.6.10-1~ubuntu18.04.0 tshark 2.6.10-1~ubuntu18.04.0 wireshark 2.6.10-1~ubuntu18.04.0 wireshark-common 2.6.10-1~ubuntu18.04.0 wireshark-gtk 2.6.10-1~ubuntu18.04.0 wireshark-qt 2.6.10-1~ubuntu18.04.0
Ubuntu 16.04 LTS: libwireshark-data 2.6.10-1~ubuntu16.04.0 libwireshark11 2.6.10-1~ubuntu16.04.0 libwiretap8 2.6.10-1~ubuntu16.04.0 libwscodecs2 2.6.10-1~ubuntu16.04.0 libwsutil9 2.6.10-1~ubuntu16.04.0 tshark 2.6.10-1~ubuntu16.04.0 wireshark 2.6.10-1~ubuntu16.04.0 wireshark-common 2.6.10-1~ubuntu16.04.0 wireshark-gtk 2.6.10-1~ubuntu16.04.0 wireshark-qt 2.6.10-1~ubuntu16.04.0
This update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4133-1 CVE-2019-12295, CVE-2019-13619
Package Information: https://launchpad.net/ubuntu/+source/wireshark/2.6.10-1~ubuntu19.04.0 https://launchpad.net/ubuntu/+source/wireshark/2.6.10-1~ubuntu18.04.0 https://launchpad.net/ubuntu/+source/wireshark/2.6.10-1~ubuntu16.04.0
--OL1NzUwQzSYIV8acv5zDG14iK4uaSzTAD--
--UP05sJCE7dJVurFeK4m4v8GnqiaQg4Tlj Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEwZbe96kJeWh2OITRdyg1Qz0oXX0FAl1/GyIACgkQdyg1Qz0o XX0lOQ/+JiFP4XLvlZ4TT9ZyXaPmeuxZzS0EHPOSioZVYLPXDL3fNrGK3qtCr1OO QtJZ0lPjNJPzzsujVqqHYUv1Xps4Sym6VqKVzEbi53ffg/J05pxFwTF9VRcI2aro UHIpdGjKQyCjon5iptNIMsGjnqTxy5XWOzUawIWjalBvLTK25+VJ5z306VzbKpx0 JG1vXKOORddmdrJRWlgN1YAUzctd6qvZ4Mn8l7je0x1X4ZsROUcOh/dkLpiGrzXg 4Td3DF+yhQeAzri88+W3Z0PIcfjmZ9i97SkPEy1HVAESM+akaYcKkkOEndb3JsXW Oys+Zi4e/yerz8y2rs5k0VdvM9ERSaoravf7AscXOywyKwkvxFk+K+Z1BH7+yrzK 3MONWtfnquhORcFgBTQR5JuiILQZLhj/rHJvOjYErgdBGO1zmq6TQR1e2NzuIyHq GDlcI7PTxU6NZ/H5kqRHdacH658U2lFiCyLkZx1zI+qylCwSwhJVsRgbPaXh+ekV nMveugkfEq65bsGAoeLLCf+InX2uGRRDz1bK1J5K68K3me1lUsLE08XAW4fS2Dh3 YtvTe+qlKZi4X/1ppGZ6IisGE9ovdCMzf1lxuLtKWjVlbLnoWB1BX7EbNf2TTXeZ 8fyJQlOxLRvdXCWJkEPu4FMAl0ERLn6e+zGOWwDWjCpXNG5J5s4= =WgFJ -----END PGP SIGNATURE-----
--UP05sJCE7dJVurFeK4m4v8GnqiaQg4Tlj--
--===============3419000826742033839== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============3419000826742033839==--
|
|
|
|