Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200712-23 ] Wireshark: Multiple vulnerabilities
Date: Sun, 30 Dec 2007 18:03:06
Message-Id: 200712301839.55548.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200712-23
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Wireshark: Multiple vulnerabilities
9 Date: December 30, 2007
10 Bugs: #199958
11 ID: 200712-23
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been discovered in Wireshark, allowing
19 for the remote execution of arbitrary code and a Denial of Service.
20
21 Background
22 ==========
23
24 Wireshark is a network protocol analyzer with a graphical front-end.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 net-analyzer/wireshark < 0.99.7 >= 0.99.7
33
34 Description
35 ===========
36
37 Multiple buffer overflows and infinite loops were discovered in
38 multiple dissector and parser components, including those for MP3 and
39 NCP (CVE-2007-6111), PPP (CVE-2007-6112), DNP (CVE-2007-6113), SSL and
40 iSeries (OS/400) Communication traces (CVE-2007-6114), ANSI MAP
41 (CVE-2007-6115), Firebird/Interbase (CVE-2007-6116), HTTP
42 (CVE-2007-6117), MEGACO (CVE-2007-6118), DCP ETSI (CVE-2007-6119),
43 Bluetooth SDP (CVE-2007-6120), RPC Portmap (CVE-2007-6121), SMB
44 (CVE-2007-6438), IPv6 amd USB (CVE-2007-6439), WiMAX (CVE-2007-6441),
45 RPL (CVE-2007-6450), CIP (CVE-2007-6451). The vulnerabilities were
46 discovered by Stefan Esser, Beyond Security, Fabiodds, Peter Leeming,
47 Steve and ainsley.
48
49 Impact
50 ======
51
52 A remote attacker could send specially crafted packets on a network
53 being monitored with Wireshark or entice a user to open a specially
54 crafted file, possibly resulting in the execution of arbitrary code
55 with the privileges of the user running Wireshark (which might be the
56 root user), or a Denial of Service.
57
58 Workaround
59 ==========
60
61 There is no known workaround at this time.
62
63 Resolution
64 ==========
65
66 All Wireshark users should upgrade to the latest version:
67
68 # emerge --sync
69 # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.7"
70
71 References
72 ==========
73
74 [ 1 ] CVE-2007-6111
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111
76 [ 2 ] CVE-2007-6112
77 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112
78 [ 3 ] CVE-2007-6113
79 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113
80 [ 4 ] CVE-2007-6114
81 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114
82 [ 5 ] CVE-2007-6115
83 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115
84 [ 6 ] CVE-2007-6116
85 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116
86 [ 7 ] CVE-2007-6117
87 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117
88 [ 8 ] CVE-2007-6118
89 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118
90 [ 9 ] CVE-2007-6119
91 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119
92 [ 10 ] CVE-2007-6120
93 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120
94 [ 11 ] CVE-2007-6121
95 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121
96 [ 12 ] CVE-2007-6438
97 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438
98 [ 13 ] CVE-2007-6439
99 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439
100 [ 14 ] CVE-2007-6441
101 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441
102 [ 15 ] CVE-2007-6450
103 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450
104 [ 16 ] CVE-2007-6451
105 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451
106
107 Availability
108 ============
109
110 This GLSA and any updates to it are available for viewing at
111 the Gentoo Security Website:
112
113 http://security.gentoo.org/glsa/glsa-200712-23.xml
114
115 Concerns?
116 =========
117
118 Security is a primary focus of Gentoo Linux and ensuring the
119 confidentiality and security of our users machines is of utmost
120 importance to us. Any security concerns should be addressed to
121 security@g.o or alternatively, you may file a bug at
122 http://bugs.gentoo.org.
123
124 License
125 =======
126
127 Copyright 2007 Gentoo Foundation, Inc; referenced text
128 belongs to its owner(s).
129
130 The contents of this document are licensed under the
131 Creative Commons - Attribution / Share Alike license.
132
133 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature