Bug 10145

Summary: wireshark new releases 1.6.15 and 1.8.7 fix security issues
Product: Mageia Reporter: David Walser <luigiwalser>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact: Sec team <security>
Severity: normal    
Priority: Normal CC: oe, sysadmin-bugs
Version: 3Keywords: validated_update
Target Milestone: ---   
Hardware: i586   
OS: Linux   
URL: http://lwn.net/Vulnerabilities/552736/
Whiteboard: MGA2TOO has_procedure mga2-32-ok mga2-64-ok mga3-32-ok mga3-64-ok
Source RPM: wireshark-1.6.14-1.mga2.src.rpm CVE:
Status comment:

Description David Walser 2013-05-18 13:19:13 CEST
Wireshark has issued new releases on May 17:
http://www.wireshark.org/news/20130517.html

Reproducible: 

Steps to Reproduce:
Comment 1 David Walser 2013-05-18 13:19:43 CEST
The new versions are in SVN.

Whiteboard: (none) => MGA3TOO, MGA2TOO

Comment 2 Oden Eriksson 2013-05-20 09:47:35 CEST
Can't reproduce this with wireshark-1.6.14-1.mga2:

http://www.wireshark.org/security/wnpa-sec-2013-25.html

CC: (none) => oe

Comment 3 David Walser 2013-05-21 01:26:42 CEST
CVEs have now been assigned for the issues fix herein:
http://openwall.com/lists/oss-security/2013/05/20/7
Comment 4 David Walser 2013-05-24 19:29:46 CEST
Updated packages uploaded for Mageia 2, Mageia 3, and Cauldron.

Advisory (Mageia 3):
========================

Updated wireshark packages fix security vulnerabilities:

The RELOAD dissector could go into an infinite loop (CVE-2013-2486,
CVE-2013-2487).

The GTPv2 dissector could crash (CVE-2013-3555).

The ASN.1 BER dissector could crash (CVE-2013-3557).

The PPP CCP dissector could crash (CVE-2013-3558).

The DCP ETSI dissector could crash (CVE-2013-3559).

The MPEG DSM-CC dissector could crash (CVE-2013-3560).

The Websocket dissector could crash. The MySQL dissector could go into an
infinite loop. The ETCH dissector could go into a large loop (CVE-2013-3561,
CVE-2013-3562).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560
http://www.wireshark.org/security/wnpa-sec-2013-23.html
http://www.wireshark.org/security/wnpa-sec-2013-24.html
http://www.wireshark.org/security/wnpa-sec-2013-25.html
http://www.wireshark.org/security/wnpa-sec-2013-26.html
http://www.wireshark.org/security/wnpa-sec-2013-27.html
http://www.wireshark.org/security/wnpa-sec-2013-28.html
http://www.wireshark.org/security/wnpa-sec-2013-29.html
http://www.wireshark.org/security/wnpa-sec-2013-30.html
http://www.wireshark.org/security/wnpa-sec-2013-31.html
http://www.wireshark.org/docs/relnotes/wireshark-1.8.7.html
http://www.wireshark.org/news/20130517.html
http://openwall.com/lists/oss-security/2013/05/20/7
========================

Updated packages in core/updates_testing:
========================
wireshark-1.8.7-1.mga3
libwireshark2-1.8.7-1.mga3
libwireshark-devel-1.8.7-1.mga3
wireshark-tools-1.8.7-1.mga3
tshark-1.8.7-1.mga3
rawshark-1.8.7-1.mga3
dumpcap-1.8.7-1.mga3

from wireshark-1.8.7-1.mga3.src.rpm

Advisory (Mageia 2):
========================

Updated wireshark packages fix security vulnerability:

The ASN.1 BER dissector could crash (CVE-2013-3557).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557
http://www.wireshark.org/security/wnpa-sec-2013-25.html
http://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html
http://www.wireshark.org/news/20130517.html
http://openwall.com/lists/oss-security/2013/05/20/7
========================

Updated packages in core/updates_testing:
========================
wireshark-1.6.15-1.mga2
libwireshark1-1.6.15-1.mga2
libwireshark-devel-1.6.15-1.mga2
wireshark-tools-1.6.15-1.mga2
tshark-1.6.15-1.mga2
rawshark-1.6.15-1.mga2
dumpcap-1.6.15-1.mga2

from wireshark-1.6.15-1.mga2.src.rpm

Version: Cauldron => 3
Assignee: bugsquad => qa-bugs
Whiteboard: MGA3TOO, MGA2TOO => MGA2TOO

Comment 6 claire robinson 2013-05-28 16:53:55 CEST
For Mga2 the only PoC is attached to
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8599
Comment 7 claire robinson 2013-05-28 17:11:40 CEST
Testing complete mga2 32

The pcap file doesn't cause any obvious issues in our wireshark. Created a wireshark capture as root and saved it, then opened it again.

Whiteboard: MGA2TOO => MGA2TOO has_procedure mga2-32-ok

Comment 8 claire robinson 2013-05-28 17:23:00 CEST
Testing complete mga2 64

Whiteboard: MGA2TOO has_procedure mga2-32-ok => MGA2TOO has_procedure mga2-32-ok mga2-64-ok

Comment 9 claire robinson 2013-05-28 18:05:52 CEST
Testing mga3 64 using a variety of the PoCs

Some crash some cause max cpu usage. After update all open normally.

When opened as root to make a capture there is a Lua error.

Lua: Error during loading:
 [string "/usr/share/wireshark/init.lua"]:45: Wireshark is running as root, this is dangerous. The lua function dofile has been disabled, because it is potentially harmful when running as root

It does open and does capture OK though afterwards, with the standard wireshark run-as-root warning message after that.

Whiteboard: MGA2TOO has_procedure mga2-32-ok mga2-64-ok => MGA2TOO feedback has_procedure mga2-32-ok mga2-64-ok

Comment 10 claire robinson 2013-05-28 18:27:17 CEST
This is the same i586 and it seems wireshark now needs users to be added to 'wireshark' group instead of being run as root.

When the wireshark group is added to the user and then logged out/in again wireshark operates normally and captures can be made by regular users.

So, testing complete mga3 32 & 64

Validating

Advisory and SRPM's for mga2 and 3 in comment 4

Could sysadmin please push from 2 & 3 core/updates_testing to core/updates

Thanks!

Keywords: (none) => validated_update
Whiteboard: MGA2TOO feedback has_procedure mga2-32-ok mga2-64-ok => MGA2TOO has_procedure mga2-32-ok mga2-64-ok mga3-32-ok mga3-64-ok
CC: (none) => sysadmin-bugs

Comment 11 David Walser 2013-06-04 00:09:27 CEST
Debian has issued an advisory for this on June 2:
http://www.debian.org/security/2013/dsa-2700

URL: (none) => http://lwn.net/Vulnerabilities/552736/

Comment 12 Nicolas Vigier 2013-06-06 21:42:33 CEST
Packages have been pushed to updates.

Status: NEW => RESOLVED
CC: (none) => boklm
Resolution: (none) => FIXED

Nicolas Vigier 2014-05-08 18:06:57 CEST

CC: boklm => (none)