Bug 1163583 (CVE-2014-8711)
Summary: | CVE-2014-8711 wireshark: AMQP dissector crash (wnpa-sec-2014-21) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Murray McAllister <mmcallis> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | huzaifas, lemenkov, phatina, rvokal, sisharma |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | wireshark 1.12.2, wireshark 1.10.11 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-11-20 04:47:16 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1163585, 1208005, 1245763 | ||
Bug Blocks: | 1163586, 1210268 |
Description
Murray McAllister
2014-11-13 04:29:14 UTC
Created wireshark tracking bugs for this issue: Affects: fedora-all [bug 1163585] upstream fix ------------ Info: https://code.wireshark.org/review/#/c/5176/ Patch1: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=patch;h=8f62bb7cce5a82baa543b14800fd7c12548b497a Patch2: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=patch;h=c44ff776c4d270a8ae1d2fea39eae8c0a14d9dd9 wireshark-1.10.11-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. Analysis ======== In the various places of the amqp_0_10 code 32 bit size field is used as the size of the following data field which creates potential for overflows when using 32 bit arithmetic. This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:1460 https://rhn.redhat.com/errata/RHSA-2015-1460.html Actually, in 1.10.x, it's fixed by c567c0e0d0d08760944d6674d827e96bdb242964. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2393 https://rhn.redhat.com/errata/RHSA-2015-2393.html Statement: This issue did not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 |