SB2021070901 - Gentoo update for Wireshark
Published: July 9, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Memory leak (CVE-ID: CVE-2021-22173)
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak within USB HID dissector. A remote attacker can force the application to leak memory and perform denial of service attack.
2) Input validation error (CVE-ID: CVE-2021-22174)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the USB HID dissector. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
3) Input validation error (CVE-ID: CVE-2021-22191)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing URLs. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
4) Buffer overflow (CVE-ID: CVE-2021-22207)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the MS-WSP dissector in Wireshark. A remote attacker can send specially crafted packets over the network or convince the victim to read a malformed packet trace file and consume excessive CPU resources, causing denial of service condition.
5) Infinite loop (CVE-ID: CVE-2021-22222)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the DVB-S2-BB dissector. A remote attacker can consume all available system resources and cause denial of service conditions.
Remediation
Install update from vendor's website.