SB2017072610 - Arch Linux update for wireshark-cli
Published: July 26, 2017 Updated: July 26, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 vulnerabilities.
1) Infinite loop (CVE-ID: CVE-2017-11406)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by rejecting invalid Frame Control parameter values.
2) Input validation error (CVE-ID: CVE-2017-11407)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the MQ dissector could crash. This was addressed in epan/dissectors/packet-mq.c by validating the fragment length before a reassembly attempt.
3) Improper input validation (CVE-ID: CVE-2017-11408)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error in the AMQP dissector in epan/dissectors/packet-amqp.c when processing network packets. A remote attacker can send a specially crafted packet and crash the vulnerable application.
4) Input validation error (CVE-ID: CVE-2017-11410)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding validation of the relationships between indexes and lengths. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-7702.
5) Input validation error (CVE-ID: CVE-2017-11411)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by adding length validation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-9350.
6) Infinite loop (CVE-ID: CVE-2017-7702)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.
7) Memory corruption (CVE-ID: CVE-2017-9350)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to memory corruption in the DICOM dissector when checking for a negative length. A remote attacker can inject a malformed packet epan/dissectors/packet-opensafety.c onto the wire or persuade the target user to read a malformed packet trace file and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Install update from vendor's website.