SB2012120501 - Multiple vulnerabilities in Wireshark 



SB2012120501 - Multiple vulnerabilities in Wireshark

Published: December 5, 2012 Updated: August 11, 2020

Security Bulletin ID SB2012120501
Severity
Medium
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2012-6056)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Duplicate TSN count.


2) Input validation error (CVE-ID: CVE-2012-6057)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_eigrp_metric_comm function in epan/dissectors/packet-eigrp.c in the EIGRP dissector in Wireshark 1.8.x before 1.8.4 uses the wrong data type for a certain offset value, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a malformed packet.


3) Input validation error (CVE-ID: CVE-2012-6058)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Integer overflow in the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Number of Sources value.


4) Input validation error (CVE-ID: CVE-2012-6059)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data structure to determine IKEv2 decryption parameters, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.


5) Input validation error (CVE-ID: CVE-2012-6060)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.


6) Input validation error (CVE-ID: CVE-2012-6061)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.


7) Input validation error (CVE-ID: CVE-2012-6062)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.


8) Information disclosure (CVE-ID: CVE-2012-6052)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

Wireshark 1.8.x before 1.8.4 allows remote attackers to obtain sensitive hostname information by reading pcap-ng files.


9) Input validation error (CVE-ID: CVE-2012-6053)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

epan/dissectors/packet-usb.c in the USB dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 relies on a length field to calculate an offset value, which allows remote attackers to cause a denial of service (infinite loop) via a zero value for this field.


10) Input validation error (CVE-ID: CVE-2012-6054)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6.


11) Input validation error (CVE-ID: CVE-2012-6055)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

epan/dissectors/packet-3g-a11.c in the 3GPP2 A11 dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a zero value in a sub-type length field.


Remediation

Install update from vendor's website.

References