SB2015052603 - Multiple vulnerabilities in Wireshark
Published: May 26, 2015 Updated: March 24, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2015-3906)
The vulnerability allows a remote attacker to gain access to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the wiretap/logcat.c function in the Android Logcat file parser file. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and crash the affected application.
2) Out-of-bounds read (CVE-ID: CVE-2015-3815)
The vulnerability allows a remote attacker to gain access to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the wiretap/logcat.c function in the Android Logcat file parser file. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and crash the affected application.
3) Resource management error (CVE-ID: CVE-2015-3813)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
4) Resource management error (CVE-ID: CVE-2015-3810)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
5) Input validation error (CVE-ID: CVE-2015-3809)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not properly track the current offset, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
6) Input validation error (CVE-ID: CVE-2015-3808)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
Remediation
Install update from vendor's website.
References
- http://www.securityfocus.com/bid/74837
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b3b1f7c3aa2233a147294bad833b748d38fba84d
- https://security.gentoo.org/glsa/201510-03
- http://www.debian.org/security/2015/dsa-3277
- http://www.securityfocus.com/bid/74630
- https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html
- http://rhn.redhat.com/errata/RHSA-2017-0631.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/74633
- http://www.wireshark.org/security/wnpa-sec-2015-16.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11129
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c35f2ccb4433718416551cc7a85afb0860529d57
- http://www.securityfocus.com/bid/74629
- http://www.wireshark.org/security/wnpa-sec-2015-13.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10989
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=4ee6bcbd2e03a25f1e6b0239558d9edeaf8040c0
- http://www.securityfocus.com/bid/74632
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c19860dba8d158c42865c3d9051b6f318cb41169
- http://www.securityfocus.com/bid/74628