Friday, February 1, 2013

VULNERABILITIES / FIXES - January 30, 2013

Wireshark Multiple Vulnerabilities

Release Date : 2013-01-30

Criticality level : Highly critical
Impact : DoS
System access
Where : From remote
Solution Status : Vendor Patch

Software: Wireshark 1.x

Description:
Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets.

2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

3) An error in the DTN dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

4) An error in the MS-MMC dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

5) An error in the DTLS dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

6) An error in the ROHC dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

7) An error in the DCP-ETSI dissector when processing certain packets can be exploited to cause a memory corruption via a specially crafted packet.

8) An error in the dissection engine when processing certain packets can be exploited to cause a crash via a specially crafted packet.

9) An error in the NTLMSSP dissector when processing certain packets can be exploited to cause a buffer overflow via a specially crafted packet.

Successful exploitation of this vulnerability may allow execution of arbitrary code.

The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13.

Solution:
Update to version 1.8.5 or 1.6.13.

Provided and/or discovered by:
1, 5, 7, 8) The vendor credits Laurent Butti
2) The vendor credits Laurent Butti and the Wireshark Development Team
3, 4, 6) Reported by the vendor
9) The vendor credits Ulf Harnhammar

Original Advisory:
http://www.wireshark.org/docs/relnotes/wireshark-1.8.5.html

http://secunia.com/advisories/51968/

No comments:

Post a Comment