Wireshark Multiple Denial of Service Vulnerabilities
Last Update Date:
30 Nov 2012
Release Date:
29 Nov 2012
4802
Views
RISK: Medium Risk
TYPE: Security software and application - Security Software & Appliance
Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).
- An error in the USB dissector (epan/dissectors/packet-usb.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
- An error in the sFlow dissector (epan/dissectors/packet-sflow.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
- An error in the SCTP dissector (epan/dissectors/packet-sctp.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
- An error in the EIGRP dissector (epan/dissectors/packet-eigrp.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
- An error within the ISAKMP dissector (epan/dissectors/packet-isakmp.c) when handling IKEv2 data can be exploited to cause a crash.
- An error in the iSCSI dissector (epan/dissectors/packet-iscsi.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
- An error in the WTP dissector (epan/dissectors/packet-wtp.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
- An error in the RTCP dissector (epan/dissectors/packet-rtcp.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
- An error in the 3GPP2 A11 dissector (epan/dissectors/packet-3g-a11.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
- An error in the ICMPv6 dissector (epan/dissectors/packet-icmpv6.c) can be exploited to cause an infinite loop and consume CPU resources via a specially crafted packet.
- A vulnerability exists due to the application disclosing hostname information when creating Pcap-ng files.
Impact
- Denial of Service
- Information Disclosure
System / Technologies affected
- Versions 1.8.0 to 1.8.3
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to Wireshark 1.8.4 or later.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
- http://www.wireshark.org/security/wnpa-sec-2012-30.html
- http://www.wireshark.org/security/wnpa-sec-2012-31.html
- http://www.wireshark.org/security/wnpa-sec-2012-32.html
- http://www.wireshark.org/security/wnpa-sec-2012-33.html
- http://www.wireshark.org/security/wnpa-sec-2012-34.html
- http://www.wireshark.org/security/wnpa-sec-2012-35.html
- http://www.wireshark.org/security/wnpa-sec-2012-36.html
- http://www.wireshark.org/security/wnpa-sec-2012-37.html
- http://www.wireshark.org/security/wnpa-sec-2012-38.html
- http://www.wireshark.org/security/wnpa-sec-2012-39.html
- http://www.wireshark.org/security/wnpa-sec-2012-40.html
Share with