Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for wireshark RHSA-2013:0125-01
Summary:The remote host is missing an update for the 'wireshark'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'wireshark'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Wireshark, previously known as Ethereal, is a network protocol analyzer. It
is used to capture and browse the traffic running on a computer network.

A heap-based buffer overflow flaw was found in the way Wireshark handled
Endace ERF (Extensible Record Format) capture files. If Wireshark opened a
specially-crafted ERF capture file, it could crash or, possibly, execute
arbitrary code as the user running Wireshark. (CVE-2011-4102)

Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2011-1958, CVE-2011-1959, CVE-2011-2175,
CVE-2011-2698, CVE-2012-0041, CVE-2012-0042, CVE-2012-0066, CVE-2012-0067,
CVE-2012-4285, CVE-2012-4289, CVE-2012-4290, CVE-2012-4291)

The CVE-2011-1958, CVE-2011-1959, CVE-2011-2175, and CVE-2011-4102 issues
were discovered by Huzaifa Sidhpurwala of the Red Hat Security Response

This update also fixes the following bugs:

* When Wireshark starts with the X11 protocol being tunneled through an SSH
connection, it automatically prepares its capture filter to omit the SSH
packets. If the SSH connection was to a link-local IPv6 address including
an interface name (for example ssh -X [ipv6addr]%eth0), Wireshark parsed
this address erroneously, constructed an incorrect capture filter and
refused to capture packets. The 'Invalid capture filter' message was
displayed. With this update, parsing of link-local IPv6 addresses is fixed
and Wireshark correctly prepares a capture filter to omit SSH packets over
a link-local IPv6 connection. (BZ#438473)

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
wireshark on Red Hat Enterprise Linux (v. 5 server)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1958
BugTraq ID: 48066
Debian Security Information: DSA-2274 (Google Search)
RedHat Security Advisories: RHSA-2013:0125
XForce ISS Database: wireshark-diameter-dos(67791)
Common Vulnerability Exposure (CVE) ID: CVE-2011-1959
XForce ISS Database: wireshark-snoop-dos(67792)
Common Vulnerability Exposure (CVE) ID: CVE-2011-2175
Common Vulnerability Exposure (CVE) ID: CVE-2011-2698
BugTraq ID: 49071
XForce ISS Database: wireshark-ansiamap-dos(69074)
Common Vulnerability Exposure (CVE) ID: CVE-2011-4102
BugTraq ID: 50486
XForce ISS Database: wireshark-erf-bo(71092)
Common Vulnerability Exposure (CVE) ID: CVE-2012-0041
Common Vulnerability Exposure (CVE) ID: CVE-2012-0042
Common Vulnerability Exposure (CVE) ID: CVE-2012-0066
Common Vulnerability Exposure (CVE) ID: CVE-2012-0067
Common Vulnerability Exposure (CVE) ID: CVE-2012-4285
BugTraq ID: 55035
SuSE Security Announcement: openSUSE-SU-2012:1035 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:1067 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2012-4289
Common Vulnerability Exposure (CVE) ID: CVE-2012-4290
Common Vulnerability Exposure (CVE) ID: CVE-2012-4291
CopyrightCopyright (c) 2013 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.