SB2017072031 - Fedora 26 update for wireshark
Published: July 20, 2017 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Infinite loop (CVE-ID: CVE-2017-11406)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by rejecting invalid Frame Control parameter values.
2) Input validation error (CVE-ID: CVE-2017-11407)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the MQ dissector could crash. This was addressed in epan/dissectors/packet-mq.c by validating the fragment length before a reassembly attempt.
3) Improper input validation (CVE-ID: CVE-2017-11408)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error in the AMQP dissector in epan/dissectors/packet-amqp.c when processing network packets. A remote attacker can send a specially crafted packet and crash the vulnerable application.
Remediation
Install update from vendor's website.