SB2015052603 - Multiple vulnerabilities in Wireshark 



SB2015052603 - Multiple vulnerabilities in Wireshark

Published: May 26, 2015 Updated: March 24, 2022

Security Bulletin ID SB2015052603
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Out-of-bounds read (CVE-ID: CVE-2015-3906)

The vulnerability allows a remote attacker to gain access to perform denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the wiretap/logcat.c function in the Android Logcat file parser file. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and crash the affected application.


2) Out-of-bounds read (CVE-ID: CVE-2015-3815)

The vulnerability allows a remote attacker to gain access to perform denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the wiretap/logcat.c function in the Android Logcat file parser file. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and crash the affected application.


3) Resource management error (CVE-ID: CVE-2015-3813)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.


4) Resource management error (CVE-ID: CVE-2015-3810)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.


5) Input validation error (CVE-ID: CVE-2015-3809)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not properly track the current offset, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.


6) Input validation error (CVE-ID: CVE-2015-3808)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.


Remediation

Install update from vendor's website.