[arch-security] [ASA-201601-6] wireshark-qt: denial of service

Christian Rebischke Chris.Rebischke at archlinux.org
Sat Jan 9 22:35:56 UTC 2016


Arch Linux Security Advisory ASA-201601-6
=========================================

Severity: Medium
Date    : 2016-01-09
CVE-ID  : CVE-2015-8742 CVE-2015-8741 CVE-2015-8740 CVE-2015-8738
          CVE-2015-8739 CVE-2015-8737 CVE-2015-8736 CVE-2015-8735 
          CVE-2015-8734 CVE-2015-8733 CVE-2015-8732 CVE-2015-8730 
          CVE-2015-8731 CVE-2015-8729 CVE-2015-8728 CVE-2015-8727 
          CVE-2015-8726 CVE-2015-8725 CVE-2015-8724 CVE-2015-8723 
          CVE-2015-8722 CVE-2015-8721 CVE-2015-8720 CVE-2015-8718
          CVE-2015-8711
Package : wireshark-qt 
Type    : denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package wireshark-qt before version 2.0.1-1 is vulnerable to 
denial of service.

Resolution
==========

Upgrade to 2.0.1-1.

# pacman -Syu "wireshark-qt>=2.0.1-1"

The problems have been fixed upstream in version 2.0.1.

Workaround
==========

None.

Description
===========

- CVE-2015-8742 (denial of service)
The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c
in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not
validate the column size, which allows remote attackers to cause a
denial of service (memory consumption or application crash) via a
crafted packet.

- CVE-2015-8741 (denial of service)
The dissect_ppi function in epan/dissectors/packet-ppi.c in the PPI
dissector in Wireshark 2.0.x before 2.0.1 does not initialize a
packet-header data structure, which allows remote attackers to cause a
denial of service (application crash) via a crafted packet.

- CVE-2015-8740 (denial of service)
The dissect_tds7_colmetadata_token function in
epan/dissectors/packet-tds.c in the TDS dissector in Wireshark 2.0.x
before 2.0.1 does not validate the number of columns, which allows
remote attackers to cause a denial of service (stack-based buffer
overflow and application crash) via a crafted packet.

- CVE-2015-8738 (denial of service)
The s7comm_decode_ud_cpu_szl_subfunc function in
epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in
Wireshark 2.0.x before 2.0.1 does not validate the list count in an
SZL response, which allows remote attackers to cause a denial of
service (divide-by-zero error and application crash) via a crafted
packet.

- CVE-2015-8739 (denial of service)
The ipmi_fmt_udpport function in epan/dissectors/packet-ipmi.c in the
IPMI dissector in Wireshark 2.0.x before 2.0.1 improperly attempts to
access a packet scope, which allows remote attackers to cause a denial
of service (assertion failure and application exit) via a crafted
packet.

- CVE-2015-8737 (denial of service)
The mp2t_open function in wiretap/mp2t.c in the MP2T file parser in
Wireshark 2.0.x before 2.0.1 does not validate the bit rate, which
allows remote attackers to cause a denial of service (divide-by-zero
error and application crash) via a crafted file.

- CVE-2015-8736 (denial of service)
The mp2t_find_next_pcr function in wiretap/mp2t.c in the MP2T file
parser in Wireshark 2.0.x before 2.0.1 does not reserve memory for a
trailer, which allows remote attackers to cause a denial of service
(stack-based buffer overflow and application crash) via a crafted
file.

- CVE-2015-8735 (denial of service)
The get_value function in epan/dissectors/packet-btatt.c in the
Bluetooth Attribute (aka BT ATT) dissector in Wireshark 2.0.x before
2.0.1 uses an incorrect integer data type, which allows remote
attackers to cause a denial of service (invalid write operation and
application crash) via a crafted packet.

- CVE-2015-8734 (denial of service)
The dissect_nwp function in epan/dissectors/packet-nwp.c in the NWP
dissector in Wireshark 2.0.x before 2.0.1 mishandles the packet type,
which allows remote attackers to cause a denial of service
(application crash) via a crafted packet.

- CVE-2015-8733 (denial of service)
The ngsniffer_process_record function in wiretap/ngsniffer.c in the
Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before
2.0.1 does not validate the relationships between record lengths and
record header lengths, which allows remote attackers to cause a denial
of service (out-of-bounds read and application crash) via a crafted
file.

- CVE-2015-8732 (denial of service)
The dissect_zcl_pwr_prof_pwrprofstatersp function in
epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector
in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not
validate the Total Profile Number field, which allows remote attackers
to cause a denial of service (out-of-bounds read and application
crash) via a crafted packet.

- CVE-2015-8730 (denial of service)
epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark
1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the
number of items, which allows remote attackers to cause a denial of
service (invalid read operation and application crash) via a crafted
packet.

- CVE-2015-8731 (denial of service)
The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c
in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x
before 2.0.1 does not reject unknown TLV types, which allows remote
attackers to cause a denial of service (out-of-bounds read and
application crash) via a crafted packet.

- CVE-2015-8729 (denial of service)
The ascend_seek function in wiretap/ascendtext.c in the Ascend file
parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does
not ensure the presence of a '\0' character at the end of a date
string, which allows remote attackers to cause a denial of service
(out-of-bounds read and application crash) via a crafted file.

- CVE-2015-8728 (denial of service)
The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in
the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in
the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before
2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function,
which allows remote attackers to cause a denial of service (buffer
overflow and application crash) via a crafted packet.

- CVE-2015-8727 (denial of service)
The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in
the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before
2.0.1 does not properly maintain request-key data, which allows remote
attackers to cause a denial of service (use-after-free and application
crash) via a crafted packet

- CVE-2015-8726 (denial of service)
wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before
1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and
Modulation and Coding Scheme (MCS) data, which allows remote attackers
to cause a denial of service (out-of-bounds read and application
crash) via a crafted file.

- CVE-2015-8725 (denial of service)
The dissect_diameter_base_framed_ipv6_prefix function in
epan/dissectors/packet-diameter.c in the DIAMETER dissector in
Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not
validate the IPv6 prefix length, which allows remote attackers to
cause a denial of service (stack-based buffer overflow and application
crash) via a crafted packet.

- CVE-2015-8724 (denial of service)
The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c
in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x
before 2.0.1 does not verify the WPA broadcast key length, which
allows remote attackers to cause a denial of service (out-of-bounds
read and application crash) via a crafted packet.

- CVE-2015-8723 (denial of service)
The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the
802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before
2.0.1 does not validate the relationship between the total length and
the capture length, which allows remote attackers to cause a denial of
service (stack-based buffer overflow and application crash) via a
crafted packet.

- CVE-2015-8722 (denial of service)
epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark
1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the
frame pointer, which allows remote attackers to cause a denial of
service (NULL pointer dereference and application crash) via a crafted
packet.

- CVE-2015-8721 (denial of service)
Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c
in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote
attackers to cause a denial of service (application crash) via a
crafted packet with zlib compression.

- CVE-2015-8720 (denial of service)
The dissect_ber_GeneralizedTime function in
epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x
before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf
return value, which allows remote attackers to cause a denial of
service (application crash) via a crafted packet.

- CVE-2015-8718 (denial of service)
Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM
dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1,
when the "Match MSG/RES packets for async NLM" option is enabled,
allows remote attackers to cause a denial of service (application
crash) via a crafted packet.

- CVE-2015-8711 (denial of service)
epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark
1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate
conversation data, which allows remote attackers to cause a denial of
service (NULL pointer dereference and application crash) via a crafted
packet.

Impact
======

A remote attacker is able to cause a denial of service (application crash)
via a crafted packet.

References
==========

https://access.redhat.com/security/cve/CVE-2015-8742
https://access.redhat.com/security/cve/CVE-2015-8741
https://access.redhat.com/security/cve/CVE-2015-8740
https://access.redhat.com/security/cve/CVE-2015-8738
https://access.redhat.com/security/cve/CVE-2015-8739
https://access.redhat.com/security/cve/CVE-2015-8737
https://access.redhat.com/security/cve/CVE-2015-8736
https://access.redhat.com/security/cve/CVE-2015-8735
https://access.redhat.com/security/cve/CVE-2015-8734
https://access.redhat.com/security/cve/CVE-2015-8733
https://access.redhat.com/security/cve/CVE-2015-8732
https://access.redhat.com/security/cve/CVE-2015-8730
https://access.redhat.com/security/cve/CVE-2015-8731
https://access.redhat.com/security/cve/CVE-2015-8729
https://access.redhat.com/security/cve/CVE-2015-8728
https://access.redhat.com/security/cve/CVE-2015-8727
https://access.redhat.com/security/cve/CVE-2015-8726
https://access.redhat.com/security/cve/CVE-2015-8725
https://access.redhat.com/security/cve/CVE-2015-8724
https://access.redhat.com/security/cve/CVE-2015-8723
https://access.redhat.com/security/cve/CVE-2015-8722
https://access.redhat.com/security/cve/CVE-2015-8721
https://access.redhat.com/security/cve/CVE-2015-8720
https://access.redhat.com/security/cve/CVE-2015-8718
https://access.redhat.com/security/cve/CVE-2015-8711

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160109/417c4282/attachment.asc>


More information about the arch-security mailing list