SB2013020302 - Multiple vulnerabilities in Wireshark



SB2013020302 - Multiple vulnerabilities in Wireshark

Published: February 3, 2013 Updated: August 11, 2020

Security Bulletin ID SB2013020302
Severity
Low
Patch available
YES
Number of vulnerabilities 19
Exploitation vector Adjecent network
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 19 secuirty vulnerabilities.


1) Resource management error (CVE-ID: CVE-2013-1579)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The rtps_util_add_bitmap function in epan/dissectors/packet-rtps.c in the RTPS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly implement certain nested loops for processing bitmap data, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.


2) Input validation error (CVE-ID: CVE-2013-1580)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a position variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.


3) Input validation error (CVE-ID: CVE-2013-1581)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.


4) Input validation error (CVE-ID: CVE-2013-1582)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly manage an offset variable, which allows remote attackers to cause a denial of service (infinite loop or application crash) via a malformed packet.


5) Input validation error (CVE-ID: CVE-2013-1583)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_version_4_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.


6) Input validation error (CVE-ID: CVE-2013-1584)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.


7) Input validation error (CVE-ID: CVE-2013-1585)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.


8) Input validation error (CVE-ID: CVE-2013-1586)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.


9) Input validation error (CVE-ID: CVE-2013-1587)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.


10) Buffer overflow (CVE-ID: CVE-2013-1588)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Multiple buffer overflows in the dissect_pft_fec_detailed function in the DCP-ETSI dissector in epan/dissectors/packet-dcp-etsi.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allow remote attackers to cause a denial of service (application crash) via a malformed packet.


11) Resource management error (CVE-ID: CVE-2013-1589)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.


12) Buffer overflow (CVE-ID: CVE-2013-1590)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Buffer overflow in the NTLMSSP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.


13) Input validation error (CVE-ID: CVE-2013-1573)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.


14) Input validation error (CVE-ID: CVE-2013-1574)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a counter variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.


15) Input validation error (CVE-ID: CVE-2013-1575)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_r3_cmd_alarmconfigure function in epan/dissectors/packet-assa_r3.c in the R3 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a certain alarm length, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.


16) Cryptographic issues (CVE-ID: CVE-2013-1576)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.


17) Input validation error (CVE-ID: CVE-2013-1577)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.


18) Input validation error (CVE-ID: CVE-2013-1578)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.


19) Input validation error (CVE-ID: CVE-2013-1572)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle certain short lengths, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.


Remediation

Install update from vendor's website.

References