Skip to navigation

Security Advisory Moderate: wireshark security update

Advisory: RHSA-2012:0509-1
Type: Security Advisory
Severity: Moderate
Issued on: 2012-04-23
Last updated on: 2012-04-23
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2011-1143
CVE-2011-1590
CVE-2011-1957
CVE-2011-1958
CVE-2011-1959
CVE-2011-2174
CVE-2011-2175
CVE-2011-2597
CVE-2011-2698
CVE-2011-4102
CVE-2012-0041
CVE-2012-0042
CVE-2012-0066
CVE-2012-0067
CVE-2012-1595

Details

Updated wireshark packages that fix several security issues are now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.

Several flaws were found in Wireshark. If Wireshark read a malformed packet
off a network or opened a malicious dump file, it could crash or, possibly,
execute arbitrary code as the user running Wireshark. (CVE-2011-1590,
CVE-2011-4102, CVE-2012-1595)

Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2011-1143, CVE-2011-1957, CVE-2011-1958,
CVE-2011-1959, CVE-2011-2174, CVE-2011-2175, CVE-2011-2597, CVE-2011-2698,
CVE-2012-0041, CVE-2012-0042, CVE-2012-0067, CVE-2012-0066)

Users of Wireshark should upgrade to these updated packages, which contain
backported patches to correct these issues. All running instances of
Wireshark must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
wireshark-1.2.15-2.el6_2.1.src.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6c48e5e8e0d520319cdac31d39f650cf
SHA-256: 0267ffec12a76b9239660f1e1d6e00f4bd842f13f588fedca353cab2aa1966f5
 
IA-32:
wireshark-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 783b7a0c50a34857f240cb9fd2fade42
SHA-256: 6b6bebd714b600e65861df9de644e6934468e29c84657137697e91db463a422a
wireshark-debuginfo-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 762841cde4d0d0275f2877f0bec73be9
SHA-256: 3c07e992616ca29d3b2053225c5aff9daac9d652a3c5007201aa84d8323fd7cf
wireshark-devel-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 53f06ed0ab51b26f25ba6f05661fd09c
SHA-256: 8e74bed7aa87693f4225c3c9dba34b66185d6a2aaefbd618cf753c08366600de
wireshark-gnome-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: b825fffde1bebc4e9ca786be02fa464d
SHA-256: a925475949b535a57023f056cba696b0593a684e3e82db15892643ed5bec90b4
 
x86_64:
wireshark-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 783b7a0c50a34857f240cb9fd2fade42
SHA-256: 6b6bebd714b600e65861df9de644e6934468e29c84657137697e91db463a422a
wireshark-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: a1a9242128fb35b0c3bf5d68072d7422
SHA-256: 41518de20dd496afd96a5ae675fb1c84bef2f458aa43e9723cc3928fdad1cbca
wireshark-debuginfo-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 762841cde4d0d0275f2877f0bec73be9
SHA-256: 3c07e992616ca29d3b2053225c5aff9daac9d652a3c5007201aa84d8323fd7cf
wireshark-debuginfo-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: dcb3dc20c3e3e48ddbca1fddbaf75580
SHA-256: 608981288bb4c16bdbc3d37c2f8bee04dc9a10712f02cace8fc932e28b936af9
wireshark-devel-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 53f06ed0ab51b26f25ba6f05661fd09c
SHA-256: 8e74bed7aa87693f4225c3c9dba34b66185d6a2aaefbd618cf753c08366600de
wireshark-devel-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 32107d633ecf9f9b923cbd732b898e8d
SHA-256: 81a66cb646458509269b5c79f006969e506850b84757b657044a6b416ba0513f
wireshark-gnome-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 14c927fc9daf3f150d89df435ca37c21
SHA-256: 6d39818acfc6cdbd50497197b8dc698af808982c84c11fe05db61aaea1ef772e
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
wireshark-1.2.15-2.el6_2.1.src.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6c48e5e8e0d520319cdac31d39f650cf
SHA-256: 0267ffec12a76b9239660f1e1d6e00f4bd842f13f588fedca353cab2aa1966f5
 
IA-32:
wireshark-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 783b7a0c50a34857f240cb9fd2fade42
SHA-256: 6b6bebd714b600e65861df9de644e6934468e29c84657137697e91db463a422a
wireshark-debuginfo-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 762841cde4d0d0275f2877f0bec73be9
SHA-256: 3c07e992616ca29d3b2053225c5aff9daac9d652a3c5007201aa84d8323fd7cf
wireshark-devel-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 53f06ed0ab51b26f25ba6f05661fd09c
SHA-256: 8e74bed7aa87693f4225c3c9dba34b66185d6a2aaefbd618cf753c08366600de
wireshark-gnome-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: b825fffde1bebc4e9ca786be02fa464d
SHA-256: a925475949b535a57023f056cba696b0593a684e3e82db15892643ed5bec90b4
 
PPC:
wireshark-1.2.15-2.el6_2.1.ppc.rpm
File outdated by:  RHSA-2014:0342
    MD5: 4e20f8d95c926a2b7070742ff4090fa0
SHA-256: b988d806f69e69fb1d9ed336160c12f22282dcaa645ba6b2c4897b52e61291e8
wireshark-1.2.15-2.el6_2.1.ppc64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 3a17a7c3098684b184fede5ffb3698db
SHA-256: 96a95ea16211b24060baf542fd3014199dac5fcd2c956941aa716f78bc704517
wireshark-debuginfo-1.2.15-2.el6_2.1.ppc.rpm
File outdated by:  RHSA-2014:0342
    MD5: 31cbcee108b80aa15256cf3c391fd827
SHA-256: 244ded90356a3b0cd0f48f713e699e4a933a5139431247e81bd10317e1e1d142
wireshark-debuginfo-1.2.15-2.el6_2.1.ppc64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 2be3fcc3aff1dff9a6625ae70f6465a0
SHA-256: 24f5aefbd2781a7de2f87f84f628dbb0e4c02372a6911baff6e7af19b14c2592
wireshark-devel-1.2.15-2.el6_2.1.ppc.rpm
File outdated by:  RHSA-2014:0342
    MD5: c02db5e7d774f7b391af2b63c1a67415
SHA-256: edceff3173982ecf35819de3b3760b0c75ac4086986d4e7237e256c940012f75
wireshark-devel-1.2.15-2.el6_2.1.ppc64.rpm
File outdated by:  RHSA-2014:0342
    MD5: a874ff0896b12b1949d5084e5999fb98
SHA-256: fa0d8e7dc8c75537ea59c9ec12c3bb277be0c4dcbc69cbaf5645c70ea535a528
wireshark-gnome-1.2.15-2.el6_2.1.ppc64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 4b47c917c78568428e606a5df479813f
SHA-256: c7595292c75c1b9355768ad88770ae747e25a282134586d9de38d95b21f2c70b
 
s390x:
wireshark-1.2.15-2.el6_2.1.s390.rpm
File outdated by:  RHSA-2014:0342
    MD5: 4a6beece060e498120d7ae17059e0c1b
SHA-256: c9d8e5dce6339848ee6d041d60d335a506ae28fe43bdd69885b32f9359362d19
wireshark-1.2.15-2.el6_2.1.s390x.rpm
File outdated by:  RHSA-2014:0342
    MD5: ecbc95c8c6d7fcaaaedc591eea603a7a
SHA-256: ea7807854d3d774aa159d5b236b30bbf14ae5949d5ac5e33a654fe2821aca7b0
wireshark-debuginfo-1.2.15-2.el6_2.1.s390.rpm
File outdated by:  RHSA-2014:0342
    MD5: c864cc48408451ef94b23bf5b3517361
SHA-256: d3a400d68a8e59f6e6f04a9f77b29f974d8362520df5ab6816338316b0be4052
wireshark-debuginfo-1.2.15-2.el6_2.1.s390x.rpm
File outdated by:  RHSA-2014:0342
    MD5: 28723d9e1ee25a6753df599b991ecc83
SHA-256: 1ddc9d97ac15b95eabca6a78f9a86a29e98573e41cfb9ee851c7e0b1bd146042
wireshark-devel-1.2.15-2.el6_2.1.s390.rpm
File outdated by:  RHSA-2014:0342
    MD5: 77513c9b27428c9550c5643063b052b5
SHA-256: 29de887cf81325ee39429b19f0d126589a165cc42ae69b1229d5539f175b2d47
wireshark-devel-1.2.15-2.el6_2.1.s390x.rpm
File outdated by:  RHSA-2014:0342
    MD5: 37a8405cb5ec2c4e462941aa81f6a588
SHA-256: 364fcc78ace2e7d84e188bc5454f0229352c9b9359be96a4e0ae3f3aa9e206c0
wireshark-gnome-1.2.15-2.el6_2.1.s390x.rpm
File outdated by:  RHSA-2014:0342
    MD5: ddf8fc45c83ed73b1634e9191f3418b8
SHA-256: d65556cd6111561c6e6588d587108558034e321d7736d003276fa6451ff1edae
 
x86_64:
wireshark-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 783b7a0c50a34857f240cb9fd2fade42
SHA-256: 6b6bebd714b600e65861df9de644e6934468e29c84657137697e91db463a422a
wireshark-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: a1a9242128fb35b0c3bf5d68072d7422
SHA-256: 41518de20dd496afd96a5ae675fb1c84bef2f458aa43e9723cc3928fdad1cbca
wireshark-debuginfo-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 762841cde4d0d0275f2877f0bec73be9
SHA-256: 3c07e992616ca29d3b2053225c5aff9daac9d652a3c5007201aa84d8323fd7cf
wireshark-debuginfo-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: dcb3dc20c3e3e48ddbca1fddbaf75580
SHA-256: 608981288bb4c16bdbc3d37c2f8bee04dc9a10712f02cace8fc932e28b936af9
wireshark-devel-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 53f06ed0ab51b26f25ba6f05661fd09c
SHA-256: 8e74bed7aa87693f4225c3c9dba34b66185d6a2aaefbd618cf753c08366600de
wireshark-devel-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 32107d633ecf9f9b923cbd732b898e8d
SHA-256: 81a66cb646458509269b5c79f006969e506850b84757b657044a6b416ba0513f
wireshark-gnome-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 14c927fc9daf3f150d89df435ca37c21
SHA-256: 6d39818acfc6cdbd50497197b8dc698af808982c84c11fe05db61aaea1ef772e
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
wireshark-1.2.15-2.el6_2.1.src.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6c48e5e8e0d520319cdac31d39f650cf
SHA-256: 0267ffec12a76b9239660f1e1d6e00f4bd842f13f588fedca353cab2aa1966f5
 
x86_64:
wireshark-1.2.15-2.el6_2.1.i686.rpm     MD5: 783b7a0c50a34857f240cb9fd2fade42
SHA-256: 6b6bebd714b600e65861df9de644e6934468e29c84657137697e91db463a422a
wireshark-1.2.15-2.el6_2.1.x86_64.rpm     MD5: a1a9242128fb35b0c3bf5d68072d7422
SHA-256: 41518de20dd496afd96a5ae675fb1c84bef2f458aa43e9723cc3928fdad1cbca
wireshark-debuginfo-1.2.15-2.el6_2.1.i686.rpm     MD5: 762841cde4d0d0275f2877f0bec73be9
SHA-256: 3c07e992616ca29d3b2053225c5aff9daac9d652a3c5007201aa84d8323fd7cf
wireshark-debuginfo-1.2.15-2.el6_2.1.x86_64.rpm     MD5: dcb3dc20c3e3e48ddbca1fddbaf75580
SHA-256: 608981288bb4c16bdbc3d37c2f8bee04dc9a10712f02cace8fc932e28b936af9
wireshark-devel-1.2.15-2.el6_2.1.i686.rpm     MD5: 53f06ed0ab51b26f25ba6f05661fd09c
SHA-256: 8e74bed7aa87693f4225c3c9dba34b66185d6a2aaefbd618cf753c08366600de
wireshark-devel-1.2.15-2.el6_2.1.x86_64.rpm     MD5: 32107d633ecf9f9b923cbd732b898e8d
SHA-256: 81a66cb646458509269b5c79f006969e506850b84757b657044a6b416ba0513f
wireshark-gnome-1.2.15-2.el6_2.1.x86_64.rpm     MD5: 14c927fc9daf3f150d89df435ca37c21
SHA-256: 6d39818acfc6cdbd50497197b8dc698af808982c84c11fe05db61aaea1ef772e
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
wireshark-1.2.15-2.el6_2.1.src.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6c48e5e8e0d520319cdac31d39f650cf
SHA-256: 0267ffec12a76b9239660f1e1d6e00f4bd842f13f588fedca353cab2aa1966f5
 
IA-32:
wireshark-1.2.15-2.el6_2.1.i686.rpm     MD5: 783b7a0c50a34857f240cb9fd2fade42
SHA-256: 6b6bebd714b600e65861df9de644e6934468e29c84657137697e91db463a422a
wireshark-debuginfo-1.2.15-2.el6_2.1.i686.rpm     MD5: 762841cde4d0d0275f2877f0bec73be9
SHA-256: 3c07e992616ca29d3b2053225c5aff9daac9d652a3c5007201aa84d8323fd7cf
wireshark-devel-1.2.15-2.el6_2.1.i686.rpm     MD5: 53f06ed0ab51b26f25ba6f05661fd09c
SHA-256: 8e74bed7aa87693f4225c3c9dba34b66185d6a2aaefbd618cf753c08366600de
wireshark-gnome-1.2.15-2.el6_2.1.i686.rpm     MD5: b825fffde1bebc4e9ca786be02fa464d
SHA-256: a925475949b535a57023f056cba696b0593a684e3e82db15892643ed5bec90b4
 
PPC:
wireshark-1.2.15-2.el6_2.1.ppc.rpm     MD5: 4e20f8d95c926a2b7070742ff4090fa0
SHA-256: b988d806f69e69fb1d9ed336160c12f22282dcaa645ba6b2c4897b52e61291e8
wireshark-1.2.15-2.el6_2.1.ppc64.rpm     MD5: 3a17a7c3098684b184fede5ffb3698db
SHA-256: 96a95ea16211b24060baf542fd3014199dac5fcd2c956941aa716f78bc704517
wireshark-debuginfo-1.2.15-2.el6_2.1.ppc.rpm     MD5: 31cbcee108b80aa15256cf3c391fd827
SHA-256: 244ded90356a3b0cd0f48f713e699e4a933a5139431247e81bd10317e1e1d142
wireshark-debuginfo-1.2.15-2.el6_2.1.ppc64.rpm     MD5: 2be3fcc3aff1dff9a6625ae70f6465a0
SHA-256: 24f5aefbd2781a7de2f87f84f628dbb0e4c02372a6911baff6e7af19b14c2592
wireshark-devel-1.2.15-2.el6_2.1.ppc.rpm     MD5: c02db5e7d774f7b391af2b63c1a67415
SHA-256: edceff3173982ecf35819de3b3760b0c75ac4086986d4e7237e256c940012f75
wireshark-devel-1.2.15-2.el6_2.1.ppc64.rpm     MD5: a874ff0896b12b1949d5084e5999fb98
SHA-256: fa0d8e7dc8c75537ea59c9ec12c3bb277be0c4dcbc69cbaf5645c70ea535a528
wireshark-gnome-1.2.15-2.el6_2.1.ppc64.rpm     MD5: 4b47c917c78568428e606a5df479813f
SHA-256: c7595292c75c1b9355768ad88770ae747e25a282134586d9de38d95b21f2c70b
 
s390x:
wireshark-1.2.15-2.el6_2.1.s390.rpm     MD5: 4a6beece060e498120d7ae17059e0c1b
SHA-256: c9d8e5dce6339848ee6d041d60d335a506ae28fe43bdd69885b32f9359362d19
wireshark-1.2.15-2.el6_2.1.s390x.rpm     MD5: ecbc95c8c6d7fcaaaedc591eea603a7a
SHA-256: ea7807854d3d774aa159d5b236b30bbf14ae5949d5ac5e33a654fe2821aca7b0
wireshark-debuginfo-1.2.15-2.el6_2.1.s390.rpm     MD5: c864cc48408451ef94b23bf5b3517361
SHA-256: d3a400d68a8e59f6e6f04a9f77b29f974d8362520df5ab6816338316b0be4052
wireshark-debuginfo-1.2.15-2.el6_2.1.s390x.rpm     MD5: 28723d9e1ee25a6753df599b991ecc83
SHA-256: 1ddc9d97ac15b95eabca6a78f9a86a29e98573e41cfb9ee851c7e0b1bd146042
wireshark-devel-1.2.15-2.el6_2.1.s390.rpm     MD5: 77513c9b27428c9550c5643063b052b5
SHA-256: 29de887cf81325ee39429b19f0d126589a165cc42ae69b1229d5539f175b2d47
wireshark-devel-1.2.15-2.el6_2.1.s390x.rpm     MD5: 37a8405cb5ec2c4e462941aa81f6a588
SHA-256: 364fcc78ace2e7d84e188bc5454f0229352c9b9359be96a4e0ae3f3aa9e206c0
wireshark-gnome-1.2.15-2.el6_2.1.s390x.rpm     MD5: ddf8fc45c83ed73b1634e9191f3418b8
SHA-256: d65556cd6111561c6e6588d587108558034e321d7736d003276fa6451ff1edae
 
x86_64:
wireshark-1.2.15-2.el6_2.1.i686.rpm     MD5: 783b7a0c50a34857f240cb9fd2fade42
SHA-256: 6b6bebd714b600e65861df9de644e6934468e29c84657137697e91db463a422a
wireshark-1.2.15-2.el6_2.1.x86_64.rpm     MD5: a1a9242128fb35b0c3bf5d68072d7422
SHA-256: 41518de20dd496afd96a5ae675fb1c84bef2f458aa43e9723cc3928fdad1cbca
wireshark-debuginfo-1.2.15-2.el6_2.1.i686.rpm     MD5: 762841cde4d0d0275f2877f0bec73be9
SHA-256: 3c07e992616ca29d3b2053225c5aff9daac9d652a3c5007201aa84d8323fd7cf
wireshark-debuginfo-1.2.15-2.el6_2.1.x86_64.rpm     MD5: dcb3dc20c3e3e48ddbca1fddbaf75580
SHA-256: 608981288bb4c16bdbc3d37c2f8bee04dc9a10712f02cace8fc932e28b936af9
wireshark-devel-1.2.15-2.el6_2.1.i686.rpm     MD5: 53f06ed0ab51b26f25ba6f05661fd09c
SHA-256: 8e74bed7aa87693f4225c3c9dba34b66185d6a2aaefbd618cf753c08366600de
wireshark-devel-1.2.15-2.el6_2.1.x86_64.rpm     MD5: 32107d633ecf9f9b923cbd732b898e8d
SHA-256: 81a66cb646458509269b5c79f006969e506850b84757b657044a6b416ba0513f
wireshark-gnome-1.2.15-2.el6_2.1.x86_64.rpm     MD5: 14c927fc9daf3f150d89df435ca37c21
SHA-256: 6d39818acfc6cdbd50497197b8dc698af808982c84c11fe05db61aaea1ef772e
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
wireshark-1.2.15-2.el6_2.1.src.rpm
File outdated by:  RHSA-2014:0342
    MD5: 6c48e5e8e0d520319cdac31d39f650cf
SHA-256: 0267ffec12a76b9239660f1e1d6e00f4bd842f13f588fedca353cab2aa1966f5
 
IA-32:
wireshark-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 783b7a0c50a34857f240cb9fd2fade42
SHA-256: 6b6bebd714b600e65861df9de644e6934468e29c84657137697e91db463a422a
wireshark-debuginfo-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 762841cde4d0d0275f2877f0bec73be9
SHA-256: 3c07e992616ca29d3b2053225c5aff9daac9d652a3c5007201aa84d8323fd7cf
wireshark-devel-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 53f06ed0ab51b26f25ba6f05661fd09c
SHA-256: 8e74bed7aa87693f4225c3c9dba34b66185d6a2aaefbd618cf753c08366600de
wireshark-gnome-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: b825fffde1bebc4e9ca786be02fa464d
SHA-256: a925475949b535a57023f056cba696b0593a684e3e82db15892643ed5bec90b4
 
x86_64:
wireshark-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 783b7a0c50a34857f240cb9fd2fade42
SHA-256: 6b6bebd714b600e65861df9de644e6934468e29c84657137697e91db463a422a
wireshark-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: a1a9242128fb35b0c3bf5d68072d7422
SHA-256: 41518de20dd496afd96a5ae675fb1c84bef2f458aa43e9723cc3928fdad1cbca
wireshark-debuginfo-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 762841cde4d0d0275f2877f0bec73be9
SHA-256: 3c07e992616ca29d3b2053225c5aff9daac9d652a3c5007201aa84d8323fd7cf
wireshark-debuginfo-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: dcb3dc20c3e3e48ddbca1fddbaf75580
SHA-256: 608981288bb4c16bdbc3d37c2f8bee04dc9a10712f02cace8fc932e28b936af9
wireshark-devel-1.2.15-2.el6_2.1.i686.rpm
File outdated by:  RHSA-2014:0342
    MD5: 53f06ed0ab51b26f25ba6f05661fd09c
SHA-256: 8e74bed7aa87693f4225c3c9dba34b66185d6a2aaefbd618cf753c08366600de
wireshark-devel-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 32107d633ecf9f9b923cbd732b898e8d
SHA-256: 81a66cb646458509269b5c79f006969e506850b84757b657044a6b416ba0513f
wireshark-gnome-1.2.15-2.el6_2.1.x86_64.rpm
File outdated by:  RHSA-2014:0342
    MD5: 14c927fc9daf3f150d89df435ca37c21
SHA-256: 6d39818acfc6cdbd50497197b8dc698af808982c84c11fe05db61aaea1ef772e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

681760 - CVE-2011-1143 Wireshark: Null pointer dereference causing application crash when reading malformed pcap file
697741 - CVE-2011-1590 Wireshark: Use-after-free causes heap-based buffer overflow in X.509if dissector
710021 - CVE-2011-1957 wireshark: Infinite loop in the DICOM dissector
710039 - CVE-2011-1959 wireshark: Stack-based buffer over-read from tvbuff buffer when reading snoop capture files
710097 - CVE-2011-2174 wireshark: Double-free flaw by uncompressing of a zlib compressed packet
710109 - CVE-2011-2175 wireshark: Heap-based buffer over-read in Visual Networks dissector
710184 - CVE-2011-1958 wireshark (64bit): NULL pointer dereference by processing of a corrupted Diameter dictionary file
719753 - CVE-2011-2597 wireshark: infinite loop DoS in lucent/ascend file parser
723215 - CVE-2011-2698 wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector
750648 - CVE-2011-4102 wireshark: buffer overflow in the ERF file reader
773726 - CVE-2012-0041 wireshark: multiple file parser vulnerabilities (wnpa-sec-2012-01)
773728 - CVE-2012-0042 wireshark: NULL pointer vulnerabilities (wnpa-sec-2012-02)
783360 - CVE-2012-0066 Wireshark: Dos via large buffer allocation request
783363 - CVE-2012-0067 Wireshark: Dos due to integer overflow in IPTrace capture format parser
807644 - CVE-2012-1595 wireshark: Heap-based buffer overflow when reading ERF packets from pcap/pcap-ng trace files


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/