Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.870879
Category:Red Hat Local Security Checks
Title:RedHat Update for wireshark RHSA-2013:0125-01
Summary:The remote host is missing an update for the 'wireshark'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'wireshark'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Wireshark, previously known as Ethereal, is a network protocol analyzer. It
is used to capture and browse the traffic running on a computer network.

A heap-based buffer overflow flaw was found in the way Wireshark handled
Endace ERF (Extensible Record Format) capture files. If Wireshark opened a
specially-crafted ERF capture file, it could crash or, possibly, execute
arbitrary code as the user running Wireshark. (CVE-2011-4102)

Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2011-1958, CVE-2011-1959, CVE-2011-2175,
CVE-2011-2698, CVE-2012-0041, CVE-2012-0042, CVE-2012-0066, CVE-2012-0067,
CVE-2012-4285, CVE-2012-4289, CVE-2012-4290, CVE-2012-4291)

The CVE-2011-1958, CVE-2011-1959, CVE-2011-2175, and CVE-2011-4102 issues
were discovered by Huzaifa Sidhpurwala of the Red Hat Security Response
Team.

This update also fixes the following bugs:

* When Wireshark starts with the X11 protocol being tunneled through an SSH
connection, it automatically prepares its capture filter to omit the SSH
packets. If the SSH connection was to a link-local IPv6 address including
an interface name (for example ssh -X [ipv6addr]%eth0), Wireshark parsed
this address erroneously, constructed an incorrect capture filter and
refused to capture packets. The 'Invalid capture filter' message was
displayed. With this update, parsing of link-local IPv6 addresses is fixed
and Wireshark correctly prepares a capture filter to omit SSH packets over
a link-local IPv6 connection. (BZ#438473)

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
wireshark on Red Hat Enterprise Linux (v. 5 server)

Solution:
Please Install the Updated Packages.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1958
BugTraq ID: 48066
http://www.securityfocus.com/bid/48066
Debian Security Information: DSA-2274 (Google Search)
http://www.debian.org/security/2011/dsa-2274
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html
http://openwall.com/lists/oss-security/2011/05/31/20
http://openwall.com/lists/oss-security/2011/06/01/1
http://openwall.com/lists/oss-security/2011/06/01/11
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15045
RedHat Security Advisories: RHSA-2013:0125
http://rhn.redhat.com/errata/RHSA-2013-0125.html
http://secunia.com/advisories/44449
http://secunia.com/advisories/44958
http://secunia.com/advisories/45149
http://secunia.com/advisories/48947
XForce ISS Database: wireshark-diameter-dos(67791)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67791
Common Vulnerability Exposure (CVE) ID: CVE-2011-1959
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14656
XForce ISS Database: wireshark-snoop-dos(67792)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67792
Common Vulnerability Exposure (CVE) ID: CVE-2011-2175
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14645
Common Vulnerability Exposure (CVE) ID: CVE-2011-2698
BugTraq ID: 49071
http://www.securityfocus.com/bid/49071
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063586.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063591.html
http://www.openwall.com/lists/oss-security/2011/07/19/5
http://www.openwall.com/lists/oss-security/2011/07/20/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14610
http://secunia.com/advisories/45086
http://secunia.com/advisories/45574
XForce ISS Database: wireshark-ansiamap-dos(69074)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69074
Common Vulnerability Exposure (CVE) ID: CVE-2011-4102
BugTraq ID: 50486
http://www.securityfocus.com/bid/50486
http://openwall.com/lists/oss-security/2011/11/01/9
http://osvdb.org/76770
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15073
http://secunia.com/advisories/46644
http://secunia.com/advisories/46913
XForce ISS Database: wireshark-erf-bo(71092)
https://exchange.xforce.ibmcloud.com/vulnerabilities/71092
Common Vulnerability Exposure (CVE) ID: CVE-2012-0041
http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
http://www.openwall.com/lists/oss-security/2012/01/11/7
http://www.openwall.com/lists/oss-security/2012/01/20/4
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15297
http://secunia.com/advisories/47494
http://secunia.com/advisories/54425
Common Vulnerability Exposure (CVE) ID: CVE-2012-0042
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15368
http://www.securitytracker.com/id?1026507
Common Vulnerability Exposure (CVE) ID: CVE-2012-0066
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15111
Common Vulnerability Exposure (CVE) ID: CVE-2012-0067
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15192
Common Vulnerability Exposure (CVE) ID: CVE-2012-4285
BugTraq ID: 55035
http://www.securityfocus.com/bid/55035
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15712
http://secunia.com/advisories/50276
http://secunia.com/advisories/51363
SuSE Security Announcement: openSUSE-SU-2012:1035 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html
SuSE Security Announcement: openSUSE-SU-2012:1067 (Google Search)
https://hermes.opensuse.org/messages/15514562
Common Vulnerability Exposure (CVE) ID: CVE-2012-4289
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14963
Common Vulnerability Exposure (CVE) ID: CVE-2012-4290
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15619
Common Vulnerability Exposure (CVE) ID: CVE-2012-4291
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15813
CopyrightCopyright (c) 2013 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.