Bug 773728 (CVE-2012-0042)
Summary: | CVE-2012-0042 wireshark: NULL pointer vulnerabilities (wnpa-sec-2012-02) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | alekcejk, huzaifas, jsafrane, rvokal |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-01-08 09:12:29 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 781268, 809045, 809046, 834180 | ||
Bug Blocks: | 773730, 807617, 816611 |
Description
Vincent Danen
2012-01-12 17:49:08 UTC
Created wireshark tracking bugs for this issue Affects: fedora-all [bug 781268] The upstream patch for this issue does two things: 1. Check some functions in epan/to_str.c for NULL arguments and bail out if these are NULL. It also documents that some functions return non-null terminated strings Reference: http://anonsvn.wireshark.org/viewvc?view=revision&revision=40194 This code segment exists in all the version of wireshark shipped with Red Hat Enterprise Linux. 2. Changes to the HP Teaming heartbeat dissector to sanitize some of the parameters read from the network/scan file Reference: http://anonsvn.wireshark.org/viewvc?view=revision&revision=40195 http://anonsvn.wireshark.org/viewvc?view=revision&revision=40196 The HP team dissector does not exist in the versions of wireshark shipped with Red Hat Enterprise Linux 4, 5 and 6. Though this issue is being trigged by values passed from the HP team dissector, there are other dissectors in wireshark, which use routines defined in to_str.c to process text. Since these routines dont check for NULL input values, they cause a crash. A part of the patch addresses this issue and sanitizes these input values wireshark-1.6.5-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report. wireshark-1.4.11-1.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0509 https://rhn.redhat.com/errata/RHSA-2012-0509.html This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:0125 https://rhn.redhat.com/errata/RHSA-2013-0125.html Statement: (none) |