Security Advisory Moderate: wireshark security update

Advisory: RHSA-2014:0341-2
Type: Security Advisory
Severity: Moderate
Issued on: 2014-03-31
Last updated on: 2014-03-31
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2012-5595
CVE-2012-5598
CVE-2012-5599
CVE-2012-5600
CVE-2012-6056
CVE-2012-6060
CVE-2012-6061
CVE-2012-6062
CVE-2013-3557
CVE-2013-3559
CVE-2013-4081
CVE-2013-4083
CVE-2013-4927
CVE-2013-4931
CVE-2013-4932
CVE-2013-4933
CVE-2013-4934
CVE-2013-4935
CVE-2013-5721
CVE-2013-7112
CVE-2014-2281
CVE-2014-2299

Details

Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Wireshark is a network protocol analyzer. It is used to capture and browse
the traffic running on a computer network.

Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash or,
possibly, execute arbitrary code as the user running Wireshark.
(CVE-2013-3559, CVE-2013-4083, CVE-2014-2281, CVE-2014-2299)

Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2012-5595, CVE-2012-5598, CVE-2012-5599,
CVE-2012-5600, CVE-2012-6056, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,
CVE-2013-3557, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931, CVE-2013-4932,
CVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-5721, CVE-2013-7112)

All Wireshark users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. All running instances
of Wireshark must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
wireshark-1.0.15-6.el5_10.src.rpm
File outdated by:  RHSA-2014:1677
    MD5: 149ee46d75c7a0f1c6ba15b0c690b0ec
SHA-256: d4825ee29e65f1a1b49d44139eaaa9d2cd5afd274958a1ad07a4e99f5f054c43
 
IA-32:
wireshark-debuginfo-1.0.15-6.el5_10.i386.rpm
File outdated by:  RHSA-2014:1677
    MD5: f51021dcdd6f4b0fffbd303047fe279f
SHA-256: 701b5541e1eb31c15b31dafc141d381b4d2febad8bde33546fbe3e5573edc3ca
wireshark-gnome-1.0.15-6.el5_10.i386.rpm
File outdated by:  RHSA-2014:1677
    MD5: c03b7235f6a37806069504269d4ccb44
SHA-256: 8871406edd4636445ab83d4c5ef8ab6141e048de88728fb4d42f7779842ed2c1
 
x86_64:
wireshark-debuginfo-1.0.15-6.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:1677
    MD5: 5df435d203a7b62881f0f23e504dbc0a
SHA-256: c6a5a6401491508ec0f93eb83112848392e1bdc95372a556e0ea3056b9d93e6f
wireshark-gnome-1.0.15-6.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:1677
    MD5: 6950d34b3cb97c5cb5fcf4a8debe1e53
SHA-256: c195b577308fa55b0539029d59afa4673789fde8c8c800feb35f7f036a405088
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
wireshark-1.0.15-6.el5_10.src.rpm
File outdated by:  RHSA-2014:1677
    MD5: 149ee46d75c7a0f1c6ba15b0c690b0ec
SHA-256: d4825ee29e65f1a1b49d44139eaaa9d2cd5afd274958a1ad07a4e99f5f054c43
 
IA-32:
wireshark-1.0.15-6.el5_10.i386.rpm
File outdated by:  RHSA-2014:1677
    MD5: 5806b0423cd088c8b7224bf6fd511f17
SHA-256: b4dadb68b376a593bbc25a62595df9f9063f46dd214c991bdc2565778aa887f1
wireshark-debuginfo-1.0.15-6.el5_10.i386.rpm
File outdated by:  RHSA-2014:1677
    MD5: f51021dcdd6f4b0fffbd303047fe279f
SHA-256: 701b5541e1eb31c15b31dafc141d381b4d2febad8bde33546fbe3e5573edc3ca
wireshark-gnome-1.0.15-6.el5_10.i386.rpm
File outdated by:  RHSA-2014:1677
    MD5: c03b7235f6a37806069504269d4ccb44
SHA-256: 8871406edd4636445ab83d4c5ef8ab6141e048de88728fb4d42f7779842ed2c1
 
IA-64:
wireshark-1.0.15-6.el5_10.ia64.rpm
File outdated by:  RHSA-2014:1677
    MD5: 484e89156ac4dca2e49c5d5e9600142e
SHA-256: 3573efd46b1c1c269a1eb9d6efe395805663ca134181ae6c014b3b7db9a723ed
wireshark-debuginfo-1.0.15-6.el5_10.ia64.rpm
File outdated by:  RHSA-2014:1677
    MD5: 26340d0219fa1b3885b448125e22ab3d
SHA-256: 4860fa5632fc2c7705f17907dd8db1da85b42466c50ac94ee7a6383945346c17
wireshark-gnome-1.0.15-6.el5_10.ia64.rpm
File outdated by:  RHSA-2014:1677
    MD5: fa7fff3dbecbb9bd5195b3af55520a50
SHA-256: 431683a0783ac28e29d3c5b67026530af7bd118e8b484a5b2b0c1fd9b6c5e91d
 
PPC:
wireshark-1.0.15-6.el5_10.ppc.rpm
File outdated by:  RHSA-2014:1677
    MD5: 987d9b7374a317b400d44b6515880ff3
SHA-256: 90bbe819e1d316f94b34f84892bae02bce2263f400c9e18d8c576c3a0cd8b3cb
wireshark-debuginfo-1.0.15-6.el5_10.ppc.rpm
File outdated by:  RHSA-2014:1677
    MD5: 2591fcdf144f7197a5bd9c1ffaf259c5
SHA-256: 51162b5893e26d0809eb048c2ee2d17bfa59457db2377d14f329462dfdf9ac12
wireshark-gnome-1.0.15-6.el5_10.ppc.rpm
File outdated by:  RHSA-2014:1677
    MD5: b90c0590d460776088fb2ccd9fb7c510
SHA-256: 896003ec0227790cac2031b8743ccb95f919a4d8d2fd1f039f7172d6e38c3955
 
s390x:
wireshark-1.0.15-6.el5_10.s390x.rpm
File outdated by:  RHSA-2014:1677
    MD5: e42ae42f8f6c5d6335ece44bba12ea7c
SHA-256: 626c3373a1f4446cf2482fe16f56849760d2beb3f443b7ea13cccc13300b0d3b
wireshark-debuginfo-1.0.15-6.el5_10.s390x.rpm
File outdated by:  RHSA-2014:1677
    MD5: f3deaaca15fadfc6c0d7b6c8bcaa8cab
SHA-256: 40863a8b7f8866644819be8eb586f78de8d962dfed6ef6d313905f3043a56a66
wireshark-gnome-1.0.15-6.el5_10.s390x.rpm
File outdated by:  RHSA-2014:1677
    MD5: 6df805643228943170c0115c192fa253
SHA-256: 9cb9da89d5861d0c354271306ca2bc46e98081f3f0de6ec6b33f98703d310004
 
x86_64:
wireshark-1.0.15-6.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:1677
    MD5: 5c6e2e58e4cf28e74e88f16e6674941f
SHA-256: c04134ac2bcc91f25e6535f888d180ab257836cfd0af8f12c298e4fffa4158ba
wireshark-debuginfo-1.0.15-6.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:1677
    MD5: 5df435d203a7b62881f0f23e504dbc0a
SHA-256: c6a5a6401491508ec0f93eb83112848392e1bdc95372a556e0ea3056b9d93e6f
wireshark-gnome-1.0.15-6.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:1677
    MD5: 6950d34b3cb97c5cb5fcf4a8debe1e53
SHA-256: c195b577308fa55b0539029d59afa4673789fde8c8c800feb35f7f036a405088
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
wireshark-1.0.15-6.el5_10.src.rpm
File outdated by:  RHSA-2014:1677
    MD5: 149ee46d75c7a0f1c6ba15b0c690b0ec
SHA-256: d4825ee29e65f1a1b49d44139eaaa9d2cd5afd274958a1ad07a4e99f5f054c43
 
IA-32:
wireshark-1.0.15-6.el5_10.i386.rpm
File outdated by:  RHSA-2014:1677
    MD5: 5806b0423cd088c8b7224bf6fd511f17
SHA-256: b4dadb68b376a593bbc25a62595df9f9063f46dd214c991bdc2565778aa887f1
wireshark-debuginfo-1.0.15-6.el5_10.i386.rpm
File outdated by:  RHSA-2014:1677
    MD5: f51021dcdd6f4b0fffbd303047fe279f
SHA-256: 701b5541e1eb31c15b31dafc141d381b4d2febad8bde33546fbe3e5573edc3ca
 
x86_64:
wireshark-1.0.15-6.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:1677
    MD5: 5c6e2e58e4cf28e74e88f16e6674941f
SHA-256: c04134ac2bcc91f25e6535f888d180ab257836cfd0af8f12c298e4fffa4158ba
wireshark-debuginfo-1.0.15-6.el5_10.x86_64.rpm
File outdated by:  RHSA-2014:1677
    MD5: 5df435d203a7b62881f0f23e504dbc0a
SHA-256: c6a5a6401491508ec0f93eb83112848392e1bdc95372a556e0ea3056b9d93e6f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1007197 - CVE-2013-5721 wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)
1044508 - CVE-2013-7112 wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)
1074109 - CVE-2014-2299 wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)
1074114 - CVE-2014-2281 wireshark: NFS dissector crash (wnpa-sec-2014-01)
881742 - CVE-2012-5600 CVE-2012-6062 wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)
881748 - CVE-2012-5599 CVE-2012-6061 wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)
881771 - CVE-2012-5598 CVE-2012-6060 wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)
881809 - CVE-2012-5595 CVE-2012-6056 wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)
965190 - CVE-2013-3559 wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)
965193 - CVE-2013-3557 wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)
972686 - CVE-2013-4081 wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)
972688 - CVE-2013-4083 wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)
990166 - CVE-2013-4927 wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)
990170 - CVE-2013-4931 wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)
990172 - CVE-2013-4932 wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)
990175 - CVE-2013-4933 wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)
990178 - CVE-2013-4934 wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)
990179 - CVE-2013-4935 wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/