Mandriva Linux Security Advisory 2013-296 - The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service via a crafted packet. Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service via a long domain name in a packet. This advisory provides the latest version of Wireshark which is not vulnerable to these issues.
878776549c46a9bc09b3c25506054f13adcb45a498a6c50df1e5ca5ba1c9ffa9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2013:296
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : wireshark
Date : December 20, 2013
Affected: Business Server 1.0, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Multiple vulnerabilities was found and corrected in Wireshark:
The dissect_sip_common function in epan/dissectors/packet-sip.c in
the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before
1.10.4 does not check for empty lines, which allows remote attackers
to cause a denial of service (infinite loop) via a crafted packet
(CVE-2013-7112).
Multiple buffer overflows in the create_ntlmssp_v2_key function
in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in
Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote
attackers to cause a denial of service (application crash) via a long
domain name in a packet (CVE-2013-7114).
This advisory provides the latest version of Wireshark (1.8.12)
which is not vulnerable to these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
http://www.wireshark.org/security/wnpa-sec-2013-66.html
http://www.wireshark.org/security/wnpa-sec-2013-68.html
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
05f73378571d99273650b6774682fc8e mes5/i586/dumpcap-1.8.12-0.1mdvmes5.2.i586.rpm
d2aa2b554af6e1eb0c98a7dc96f1dd00 mes5/i586/libwireshark2-1.8.12-0.1mdvmes5.2.i586.rpm
4ef7825b09b59ad81bb8be8a5c3486f1 mes5/i586/libwireshark-devel-1.8.12-0.1mdvmes5.2.i586.rpm
b96d187a896962e2d318a8a9cf3e6e26 mes5/i586/rawshark-1.8.12-0.1mdvmes5.2.i586.rpm
051e69463dfc3b881dd011c86730cdc5 mes5/i586/tshark-1.8.12-0.1mdvmes5.2.i586.rpm
b2c7dd0593a2d496184bcbe78df8a151 mes5/i586/wireshark-1.8.12-0.1mdvmes5.2.i586.rpm
4461a17599993a5305fc47fbb39a05d2 mes5/i586/wireshark-tools-1.8.12-0.1mdvmes5.2.i586.rpm
f8860655ea8d1114d9c9227599d26692 mes5/SRPMS/wireshark-1.8.12-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
b9f1a1c7d98e15784b5fadf35f64b6f1 mes5/x86_64/dumpcap-1.8.12-0.1mdvmes5.2.x86_64.rpm
eb6f8b1be3dabf8803048a09be29d960 mes5/x86_64/lib64wireshark2-1.8.12-0.1mdvmes5.2.x86_64.rpm
32158c9f5e6bd64b2f907f62d9740261 mes5/x86_64/lib64wireshark-devel-1.8.12-0.1mdvmes5.2.x86_64.rpm
4b5fbfca3a918dab1083471e8371b402 mes5/x86_64/rawshark-1.8.12-0.1mdvmes5.2.x86_64.rpm
60329cc2a6d1eba976e418efe45f34e8 mes5/x86_64/tshark-1.8.12-0.1mdvmes5.2.x86_64.rpm
a51cc8861bc84d65c9d9d7314fd7940a mes5/x86_64/wireshark-1.8.12-0.1mdvmes5.2.x86_64.rpm
7d821ad8b4eb42b38e54b4a3b50c653a mes5/x86_64/wireshark-tools-1.8.12-0.1mdvmes5.2.x86_64.rpm
f8860655ea8d1114d9c9227599d26692 mes5/SRPMS/wireshark-1.8.12-0.1mdvmes5.2.src.rpm
Mandriva Business Server 1/X86_64:
955e0a6249c135f9b6e3b96aea2ae806 mbs1/x86_64/dumpcap-1.8.12-1.mbs1.x86_64.rpm
8c4e99d362feed33e3e95332e37a4810 mbs1/x86_64/lib64wireshark2-1.8.12-1.mbs1.x86_64.rpm
08647aa2ec96939c83386d60513f4328 mbs1/x86_64/lib64wireshark-devel-1.8.12-1.mbs1.x86_64.rpm
5edb13e8c2b09cb814057b8465bc4289 mbs1/x86_64/rawshark-1.8.12-1.mbs1.x86_64.rpm
40cd9f258b064205b1362a13c379fc37 mbs1/x86_64/tshark-1.8.12-1.mbs1.x86_64.rpm
3cca3507e5094fcf5fc190623ec1dea7 mbs1/x86_64/wireshark-1.8.12-1.mbs1.x86_64.rpm
9bc0a2917bee5c2121789436a30654b1 mbs1/x86_64/wireshark-tools-1.8.12-1.mbs1.x86_64.rpm
367f97086f4e04b3cbaeb1e59c4749eb mbs1/SRPMS/wireshark-1.8.12-1.mbs1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFStBpvmqjQ0CJFipgRApSZAJ9d7itPR8M8pVrV4EvZfC8vApRlHwCfdGzm
GyUAPj6/67M4WVHwrBn+8yg=
=D54m
-----END PGP SIGNATURE-----