Synopsis
Moderate: wireshark security, bug fix, and enhancement update
Type/Severity
Security Advisory: Moderate
Topic
Updated wireshark packages that fix multiple security issues, several bugs,and add various enhancements are now available for Red Hat EnterpriseLinux 6The Red Hat Security Response Team ha ...
Multiple vulnerabilities were discovered in the dissectors for GTPv2,
ASN1 BER, PPP CCP, DCP ETSI, MPEG DSM-CC and Websocket, which could
result in denial of service or the execution of arbitrary code
The oldstable distribution (squeeze) is not affected
For the stable distribution (wheezy), these problems have been fixed in
version 182-5wheezy ...
Debian Bug report logs -
#709167
wireshark: Security vulnerabilities fixed in 187 (CVE-2013-3555 to CVE-2013-3562)
Package:
wireshark;
Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon)
Reported by: Henri Salo <henri@nervfi>
Date: Tue, 21 May ...
Debian Bug report logs -
#776135
wireshark: Multiple security issues in 1122 and prior versions
Package:
wireshark;
Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon)
Reported by: balint@balintreczeyhu
Date: Sat, 24 Jan 2015 10:51:01 UTC
Severity: ...
Debian Bug report logs -
#780372
CVE-2015-2187 CVE-2015-2188 CVE-2015-2189 CVE-2015-2190 CVE-2015-2191 CVE-2015-2192
Package:
wireshark;
Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon)
Reported by: Moritz Muehlenhoff <jmm@debianorg>
Date: Th ...
Two flaws were found in Wireshark If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark (CVE-2013-3559, CVE-2013-4083)
Several denial of service flaws were found in Wireshark Wireshark could crash or stop responding if it read a malfor ...
epan/dissectors/packet-dcp-etsic in the DCP ETSI dissector in Wireshark 18x before 187 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet ...