Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in Wireshark
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in Wireshark
ID: MDVSA-2013:296
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0, Mandriva Business Server 1.0
Datum: Sa, 21. Dezember 2013, 10:20
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
http://www.wireshark.org/security/wnpa-sec-2013-66.html
http://www.wireshark.org/security/wnpa-sec-2013-68.html
Applikationen: Wireshark

Originalnachricht

This is a multi-part message in MIME format...

------------=_1387546430-2618-55

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:296
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : wireshark
Date : December 20, 2013
Affected: Business Server 1.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities was found and corrected in Wireshark:

The dissect_sip_common function in epan/dissectors/packet-sip.c in
the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before
1.10.4 does not check for empty lines, which allows remote attackers
to cause a denial of service (infinite loop) via a crafted packet
(CVE-2013-7112).

Multiple buffer overflows in the create_ntlmssp_v2_key function
in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in
Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote
attackers to cause a denial of service (application crash) via a long
domain name in a packet (CVE-2013-7114).

This advisory provides the latest version of Wireshark (1.8.12)
which is not vulnerable to these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
http://www.wireshark.org/security/wnpa-sec-2013-66.html
http://www.wireshark.org/security/wnpa-sec-2013-68.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
05f73378571d99273650b6774682fc8e
mes5/i586/dumpcap-1.8.12-0.1mdvmes5.2.i586.rpm
d2aa2b554af6e1eb0c98a7dc96f1dd00
mes5/i586/libwireshark2-1.8.12-0.1mdvmes5.2.i586.rpm
4ef7825b09b59ad81bb8be8a5c3486f1
mes5/i586/libwireshark-devel-1.8.12-0.1mdvmes5.2.i586.rpm
b96d187a896962e2d318a8a9cf3e6e26
mes5/i586/rawshark-1.8.12-0.1mdvmes5.2.i586.rpm
051e69463dfc3b881dd011c86730cdc5
mes5/i586/tshark-1.8.12-0.1mdvmes5.2.i586.rpm
b2c7dd0593a2d496184bcbe78df8a151
mes5/i586/wireshark-1.8.12-0.1mdvmes5.2.i586.rpm
4461a17599993a5305fc47fbb39a05d2
mes5/i586/wireshark-tools-1.8.12-0.1mdvmes5.2.i586.rpm
f8860655ea8d1114d9c9227599d26692
mes5/SRPMS/wireshark-1.8.12-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
b9f1a1c7d98e15784b5fadf35f64b6f1
mes5/x86_64/dumpcap-1.8.12-0.1mdvmes5.2.x86_64.rpm
eb6f8b1be3dabf8803048a09be29d960
mes5/x86_64/lib64wireshark2-1.8.12-0.1mdvmes5.2.x86_64.rpm
32158c9f5e6bd64b2f907f62d9740261
mes5/x86_64/lib64wireshark-devel-1.8.12-0.1mdvmes5.2.x86_64.rpm
4b5fbfca3a918dab1083471e8371b402
mes5/x86_64/rawshark-1.8.12-0.1mdvmes5.2.x86_64.rpm
60329cc2a6d1eba976e418efe45f34e8
mes5/x86_64/tshark-1.8.12-0.1mdvmes5.2.x86_64.rpm
a51cc8861bc84d65c9d9d7314fd7940a
mes5/x86_64/wireshark-1.8.12-0.1mdvmes5.2.x86_64.rpm
7d821ad8b4eb42b38e54b4a3b50c653a
mes5/x86_64/wireshark-tools-1.8.12-0.1mdvmes5.2.x86_64.rpm
f8860655ea8d1114d9c9227599d26692
mes5/SRPMS/wireshark-1.8.12-0.1mdvmes5.2.src.rpm

Mandriva Business Server 1/X86_64:
955e0a6249c135f9b6e3b96aea2ae806 mbs1/x86_64/dumpcap-1.8.12-1.mbs1.x86_64.rpm
8c4e99d362feed33e3e95332e37a4810
mbs1/x86_64/lib64wireshark2-1.8.12-1.mbs1.x86_64.rpm
08647aa2ec96939c83386d60513f4328
mbs1/x86_64/lib64wireshark-devel-1.8.12-1.mbs1.x86_64.rpm
5edb13e8c2b09cb814057b8465bc4289
mbs1/x86_64/rawshark-1.8.12-1.mbs1.x86_64.rpm
40cd9f258b064205b1362a13c379fc37 mbs1/x86_64/tshark-1.8.12-1.mbs1.x86_64.rpm
3cca3507e5094fcf5fc190623ec1dea7
mbs1/x86_64/wireshark-1.8.12-1.mbs1.x86_64.rpm
9bc0a2917bee5c2121789436a30654b1
mbs1/x86_64/wireshark-tools-1.8.12-1.mbs1.x86_64.rpm
367f97086f4e04b3cbaeb1e59c4749eb mbs1/SRPMS/wireshark-1.8.12-1.mbs1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFStBpvmqjQ0CJFipgRApSZAJ9d7itPR8M8pVrV4EvZfC8vApRlHwCfdGzm
GyUAPj6/67M4WVHwrBn+8yg=
=D54m
-----END PGP SIGNATURE-----


------------=_1387546430-2618-55
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1387546430-2618-55--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung