Wireshark 1.4.9 fix CVE-2011-3266 and other security issues : http://www.wireshark.org/lists/wireshark-announce/201109/msg00001.html
Assignee: anssi.hannula => doktor5000
Citing from: http://www.wireshark.org/lists/wireshark-announce/201109/msg00001.html The following vulnerabilities have been fixed. o wnpa-sec-2011-13 A malformed IKE packet could consume excessive resources. Versions affected: 1.4.0 to 1.4.8, 1.6.0 to 1.6.1. CVE-2011-3266 o wnpa-sec-2011-14 A malformed capture file could result in an invalid root tvbuff and cause a crash. (Bug 6135) Versions affected: 1.4.0 to 1.4.8, 1.6.0 to 1.6.1. o wnpa-sec-2011-15 Wireshark could run arbitrary Lua scripts. (Bug 6136) Versions affected: 1.4.0 to 1.4.8, 1.6.0 to 1.6.1. Working on CVE-2011-3266, the other two issues were already fixed with the last wireshark update.
Status: NEW => ASSIGNED
There is now wireshark-1.4.6-2.2.mga1 in core/updates_testing to validate ------------------------------------------------------- Suggested advisory: ------------------- This update addresses the following CVEs: - CVE-2011-3266 Wireshark is prone to a denial-of-service vulnerability because it fails to properly handle specially crafted IKE packets. An attacker can exploit this issue to trigger an infinite loop, which causes the affected application to crash, denying service to legitimate users. This issue was reported by the penetration test team Of NCNIPC (China) [1] [1] http://www.securityfocus.com/archive/1/archive/1/519049/100/0/threaded ------------------------------------------------------- Steps to reproduce: - install/update to update candidate - exploit or proof of concept does not seem to be publicly available
Assignee: doktor5000 => qa-bugs
Testing complete on i586 for the srpm wireshark-1.4.6-2.2.mga1.src.rpm. Just testing basic capture, and display of info.
CC: (none) => davidwhodgins
Testing complete x86_64 Advisory: ----------------------- This update addresses the following CVEs: - CVE-2011-3266 Wireshark is prone to a denial-of-service vulnerability because it fails to properly handle specially crafted IKE packets. An attacker can exploit this issue to trigger an infinite loop, which causes the affected application to crash, denying service to legitimate users. This issue was reported by the penetration test team Of NCNIPC (China) [1] [1] http://www.securityfocus.com/archive/1/archive/1/519049/100/0/threaded ----------------------- SRPM: wireshark-1.4.6-2.2.mga1.src.rpm Sysadmin please push from core/updates_testing to core/updates Thankyou!
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
Update pushed.
Status: ASSIGNED => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED