CVE-2009-2559 CVE-2009-2560 CVE-2009-2561 CVE-2009-2562 CVE-2009-2563: Wireshark Multiple Vulnerabilities

Related Vulnerabilities: CVE-2009-2559   CVE-2009-2560   CVE-2009-2561   CVE-2009-2562   CVE-2009-2563  

Debian Bug report logs - #538237
CVE-2009-2559 CVE-2009-2560 CVE-2009-2561 CVE-2009-2562 CVE-2009-2563: Wireshark Multiple Vulnerabilities

version graph

Reported by: Giuseppe Iuculano <giuseppe@iuculano.it>

Date: Fri, 24 Jul 2009 09:27:05 UTC

Severity: serious

Tags: security

Found in version wireshark/1.0.8-1

Fixed in version wireshark/1.2.1-1

Done: Balint Reczey <balint@balintreczey.hu>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Frederic Peters <fpeters@debian.org>:
Bug#538237; Package wireshark. (Fri, 24 Jul 2009 09:27:08 GMT) (full text, mbox, link).


Acknowledgement sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Frederic Peters <fpeters@debian.org>. (Fri, 24 Jul 2009 09:27:08 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <giuseppe@iuculano.it>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2009-2559 CVE-2009-2560 CVE-2009-2561 CVE-2009-2562 CVE-2009-2563: Wireshark Multiple Vulnerabilities
Date: Fri, 24 Jul 2009 11:10:21 +0200
Package: wireshark
Version: 1.0.8-1
Severity: serious
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for wireshark.

CVE-2009-2559[0]:
| Buffer overflow in the IPMI dissector in Wireshark 1.2.0 allows remote
| attackers to cause a denial of service (crash) via unspecified vectors
| related to an array index error.  NOTE: some of these details are
| obtained from third party information.

CVE-2009-2560[1]:
| Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote
| attackers to cause a denial of service (crash) via unspecified vectors
| in the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissectors.

CVE-2009-2561[2]:
| Unspecified vulnerability in the sFlow dissector in Wireshark 1.2.0
| allows remote attackers to cause a denial of service (CPU and memory
| consumption) via unspecified vectors.

CVE-2009-2562[3]:
| Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2
| through 1.2.0 allows remote attackers to cause a denial of service
| (crash) via unknown vectors.

CVE-2009-2563[4]:
| Unspecified vulnerability in the Infiniband dissector in Wireshark
| 1.0.6 through 1.2.0, when running on unspecified platforms, allows
| remote attackers to cause a denial of service (crash) via unknown
| vectors.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2559
    http://security-tracker.debian.net/tracker/CVE-2009-2559
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560
    http://security-tracker.debian.net/tracker/CVE-2009-2560
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2561
    http://security-tracker.debian.net/tracker/CVE-2009-2561
[3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562
    http://security-tracker.debian.net/tracker/CVE-2009-2562
[4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563
    http://security-tracker.debian.net/tracker/CVE-2009-2563

Cheers,
Giuseppe

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkppenoACgkQNxpp46476apJegCfX3KPSfs6vuNIqxo+QBTZuPwe
cR0An3b3IqIeKHehSxWtc8YGPzFvPPAB
=wBS6
-----END PGP SIGNATURE-----




Reply sent to Balint Reczey <balint@balintreczey.hu>:
You have taken responsibility. (Thu, 30 Jul 2009 06:21:05 GMT) (full text, mbox, link).


Notification sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
Bug acknowledged by developer. (Thu, 30 Jul 2009 06:21:05 GMT) (full text, mbox, link).


Message #10 received at 538237-close@bugs.debian.org (full text, mbox, reply):

From: Balint Reczey <balint@balintreczey.hu>
To: 538237-close@bugs.debian.org
Subject: Bug#538237: fixed in wireshark 1.2.1-1
Date: Thu, 30 Jul 2009 05:47:17 +0000
Source: wireshark
Source-Version: 1.2.1-1

We believe that the bug you reported is fixed in the latest version of
wireshark, which is due to be installed in the Debian FTP archive:

tshark_1.2.1-1_amd64.deb
  to pool/main/w/wireshark/tshark_1.2.1-1_amd64.deb
wireshark-common_1.2.1-1_amd64.deb
  to pool/main/w/wireshark/wireshark-common_1.2.1-1_amd64.deb
wireshark-dev_1.2.1-1_amd64.deb
  to pool/main/w/wireshark/wireshark-dev_1.2.1-1_amd64.deb
wireshark_1.2.1-1.diff.gz
  to pool/main/w/wireshark/wireshark_1.2.1-1.diff.gz
wireshark_1.2.1-1.dsc
  to pool/main/w/wireshark/wireshark_1.2.1-1.dsc
wireshark_1.2.1-1_amd64.deb
  to pool/main/w/wireshark/wireshark_1.2.1-1_amd64.deb
wireshark_1.2.1.orig.tar.gz
  to pool/main/w/wireshark/wireshark_1.2.1.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 538237@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Balint Reczey <balint@balintreczey.hu> (supplier of updated wireshark package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 14 Jul 2009 20:01:56 +0200
Source: wireshark
Binary: wireshark-common wireshark tshark wireshark-dev
Architecture: source amd64
Version: 1.2.1-1
Distribution: unstable
Urgency: high
Maintainer: Frederic Peters <fpeters@debian.org>
Changed-By: Balint Reczey <balint@balintreczey.hu>
Description: 
 tshark     - network traffic analyzer (console)
 wireshark  - network traffic analyzer
 wireshark-common - network traffic analyser (common files)
 wireshark-dev - network traffic analyser (development tools)
Closes: 470316 518441 538237
Changes: 
 wireshark (1.2.1-1) unstable; urgency=high
 .
   * New upstream release 1.2.1
     - release notes:
       http://www.wireshark.org/docs/relnotes/wireshark-1.2.1.html
     - security fixes
        - The IPMI dissector could overrun a buffer. (CVE-2009-2559)
        - The AFS dissector could crash. (CVE-2009-2562)
        - The Infiniband dissector could crash on some platforms. (CVE-2009-2563)
        - The Bluetooth L2CAP dissector could crash. (CVE-2009-2560)
        - The RADIUS dissector could crash. (CVE-2009-2560)
        - The MIOP dissector could crash. (CVE-2009-2560)
        - The sFlow dissector could use excessive CPU and memory. (CVE-2009-2561)
     (Closes: #538237)
   * dropped gnutls pkg-config patch as it has been integrated upstream
   * include asn2wrs.py (Closes: #518441)
   * fix inclusion of Python modules wireshark_be.py and wireshark_gen.py
   * updated idl2deb (Closes: #470316)
      Thanks to W. Borgert for the patch.
   * override lintian warning binary-or-shlib-defines-rpath
   * update standards-version to 3.8.2
Checksums-Sha1: 
 79a8df10614c5c821da5b3be0465b8b058f01950 1496 wireshark_1.2.1-1.dsc
 34659dc7129e121b1c0adf705ced877e8a5c5d1a 19519638 wireshark_1.2.1.orig.tar.gz
 0f9f87d193779a1731efa8e6ed0fa8a25a2c0d1d 37426 wireshark_1.2.1-1.diff.gz
 62bf2527ea93d00c38b0e8e14248e5647163c78b 13589334 wireshark-common_1.2.1-1_amd64.deb
 8cbc9abbc605a9599a11806722e04b616cb4cf0f 711192 wireshark_1.2.1-1_amd64.deb
 bd33e5c22c08bfddb9782efc671999879c9408cb 126208 tshark_1.2.1-1_amd64.deb
 a7b1c83dfc729f1f87f886cde3028562115b6129 785500 wireshark-dev_1.2.1-1_amd64.deb
Checksums-Sha256: 
 42f0eaf7bdbfa2be99cded74e8f8ff72caf51aa28b65a194435665f48e5de0a0 1496 wireshark_1.2.1-1.dsc
 6fa8603eafe1b871ff8bbec1d8151fb869669c5fdea4e34d01a36bbb43c9dc79 19519638 wireshark_1.2.1.orig.tar.gz
 2e69cd4e2991df9acccf705ba59c1b996017adf0cf71aea66022ab78b5c79ac8 37426 wireshark_1.2.1-1.diff.gz
 ecd31d665cea6f5e556c26ad61c810723941e6ba7f2ea8d7c8072e1409076f82 13589334 wireshark-common_1.2.1-1_amd64.deb
 fa6397d79afc568f36091a478213d39f85af5f14a5fa3d6b0286d524be68f241 711192 wireshark_1.2.1-1_amd64.deb
 6945447badcfe2df69312e3244eadf734b6199be75b0b82174f36c459066f28a 126208 tshark_1.2.1-1_amd64.deb
 36cd610778ae43eef5bf195485878ed8fd0d46f18c98673f3ad16f1d4d20e5e0 785500 wireshark-dev_1.2.1-1_amd64.deb
Files: 
 77aeef0904604ad2619111bf99f1c181 1496 net optional wireshark_1.2.1-1.dsc
 cfc051fec3f5a1f55783688ed84251b6 19519638 net optional wireshark_1.2.1.orig.tar.gz
 c2057490f01b2ef107b7f2be11e03e1d 37426 net optional wireshark_1.2.1-1.diff.gz
 259148d04050ecd0bfbf489577da1286 13589334 net optional wireshark-common_1.2.1-1_amd64.deb
 b7b4d0ea4ddf444f17147f838e639371 711192 net optional wireshark_1.2.1-1_amd64.deb
 f3be786db8365c3cd89b44abaf13658a 126208 net optional tshark_1.2.1-1_amd64.deb
 4b3453dd2cac85d771857f2a78b51351 785500 devel optional wireshark-dev_1.2.1-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkpxLroACgkQ0/r2+3z8lN1EzACfScLAnKfjgUgbUett9mC96mPe
1RAAmweLC3a6k5Mo1cPqr2+jqegsMpyy
=nGkd
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 15 Sep 2009 07:51:20 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:09:11 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.