Bug 1109034 (CVE-2014-4020)

Summary: CVE-2014-4020 wireshark: Frame metadissector crash (wnpa-sec-2014-07)
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: huzaifas, lemenkov, tsmetana
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-06-15 15:03:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1109036    
Bug Blocks: 1109037    

Description Murray McAllister 2014-06-13 06:29:28 UTC
It was reported that Wireshark's Frame metadissector could crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

This is reported to affect Wireshark versions 1.10.0 to 1.10.7.  It is fixed in 1.10.8.

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9999

https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10030

The version of Wireshark in Red Hat Enterprise Linux 5 and 6 is older than 1.10.x, and should not be affected. The version of Wireshark in Red Hat Enterprise Linux 7 is affected.

External References:

http://www.wireshark.org/security/wnpa-sec-2014-07.html

Comment 1 Murray McAllister 2014-06-13 06:31:18 UTC
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1109036]

Comment 3 Huzaifa S. Sidhpurwala 2014-06-13 09:27:46 UTC
Statement:

This issue does not affect the versions of wireshark as shipped with Red Hat Enterprise Linux 5 and 6. It does affect the versions of wireshark as shipped with Red Hat Enterprise Linux 7. The Red Hat Security Response Team has rated this issue as having Moderate security impact, a future update may address this flaw.

Comment 5 Product Security DevOps Team 2021-06-15 15:03:56 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2014-4020