[ASA-201805-24] wireshark-common: multiple issues
Remi Gacogne
rgacogne at archlinux.org
Tue May 29 20:05:28 UTC 2018
Arch Linux Security Advisory ASA-201805-24
==========================================
Severity: Critical
Date : 2018-05-25
CVE-ID : CVE-2018-11354 CVE-2018-11355 CVE-2018-11356 CVE-2018-11357
CVE-2018-11358 CVE-2018-11359 CVE-2018-11360 CVE-2018-11361
CVE-2018-11362
Package : wireshark-common
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-708
Summary
=======
The package wireshark-common before version 2.6.1-1 is vulnerable to
multiple issues including arbitrary code execution, information
disclosure and denial of service.
Resolution
==========
Upgrade to 2.6.1-1.
# pacman -Syu "wireshark-common>=2.6.1-1"
The problems have been fixed upstream in version 2.6.1.
Workaround
==========
None.
Description
===========
- CVE-2018-11354 (information disclosure)
An out-of-bounds read has been found in the IEEE 1905.1a dissector of
Wireshark <= 2.6.0.
- CVE-2018-11355 (arbitrary code execution)
A heap-based buffer overflow has been found in the RTCP dissector of
Wireshark <= 2.6.0.
- CVE-2018-11356 (denial of service)
A null-pointer dereference has been found in the DNS dissector of
Wireshark <= 2.6.0.
- CVE-2018-11357 (denial of service)
An integer overflow leading to excessive memory allocation has been
found in several dissectors of Wireshark <= 2.6.0.
- CVE-2018-11358 (arbitrary code execution)
A heap-based use-after-free has been found in the Q.931 dissector of
Wireshark <= 2.6.0.
- CVE-2018-11359 (denial of service)
A null-pointer dereference has been found in several dissectors of
Wireshark <= 2.6.0.
- CVE-2018-11360 (arbitrary code execution)
A heap-based off-by-one write has been found in the GSM A DTAP
dissector of Wireshark <= 2.6.0.
- CVE-2018-11361 (denial of service)
A heap-based out-of-bounds read has been found in the IEEE 802.11
dissector of Wireshark <= 2.6.0.
- CVE-2018-11362 (information disclosure)
An out-of-bounds read has been found in the LDSS dissector of Wireshark
<= 2.6.0.
Impact
======
A remote attacker can crash the application, access sensitive
information present in memory or execute arbitrary code on the affected
host via a specially crafted network packet or by convincing a local
user to open a specially crafted PCAP file.
References
==========
https://www.wireshark.org/security/wnpa-sec-2018-26.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647
https://www.wireshark.org/security/wnpa-sec-2018-27.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14673
https://www.wireshark.org/security/wnpa-sec-2018-29.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
https://www.wireshark.org/security/wnpa-sec-2018-28.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678
https://www.wireshark.org/security/wnpa-sec-2018-31.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689
https://www.wireshark.org/security/wnpa-sec-2018-33.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703
https://www.wireshark.org/security/wnpa-sec-2018-30.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688
https://www.wireshark.org/security/wnpa-sec-2018-32.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
https://www.wireshark.org/security/wnpa-sec-2018-25.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615
https://security.archlinux.org/CVE-2018-11354
https://security.archlinux.org/CVE-2018-11355
https://security.archlinux.org/CVE-2018-11356
https://security.archlinux.org/CVE-2018-11357
https://security.archlinux.org/CVE-2018-11358
https://security.archlinux.org/CVE-2018-11359
https://security.archlinux.org/CVE-2018-11360
https://security.archlinux.org/CVE-2018-11361
https://security.archlinux.org/CVE-2018-11362
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20180529/157448cb/attachment.asc>
More information about the arch-security
mailing list