Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1044510 - (CVE-2013-7114) CVE-2013-7114 wireshark: NTLMSSP v2 dissector could crash (wnpa-sec-2013-68)
CVE-2013-7114 wireshark: NTLMSSP v2 dissector could crash (wnpa-sec-2013-68)
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20131217,reported=2...
: Reopened, Security
Depends On: 1044512 1044662 1074925 1074926
Blocks: 1044516
  Show dependency treegraph
 
Reported: 2013-12-18 08:22 EST by Ratul Gupta
Modified: 2015-11-25 05:01 EST (History)
6 users (show)

See Also:
Fixed In Version: wireshark 1.8.12, wireshark 1.10.4
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-04-25 12:24:53 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0342 normal SHIPPED_LIVE Moderate: wireshark security update 2014-03-31 16:36:59 EDT

  None (edit)
Description Ratul Gupta 2013-12-18 08:22:23 EST
Wireshark recently made an announcement on their website about new versions launched, which also included some security fixes:
Wireshark 1.8.12: http://www.wireshark.org/lists/wireshark-announce/201312/msg00001.html
Wireshark 1.10.4: http://www.wireshark.org/lists/wireshark-announce/201312/msg00000.html


Quoted from their website for CVE-2013-7114:
"wnpa-sec-2013-68
  The NTLMSSP v2 dissector could crash. Discovered by Garming Sam. (Bug 9488: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9488)
  Versions affected: 1.10.0 to 1.10.3, 1.8.0 to 1.8.11
  CVE-2013-7114."

References:
https://bugs.gentoo.org/show_bug.cgi?id=494612
Comment 1 Ratul Gupta 2013-12-18 08:25:01 EST
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1044512]
Comment 2 Peter Lemenkov 2013-12-18 09:40:30 EST
Fix was backported to 1.10.3 already.
Comment 3 Vincent Danen 2013-12-18 13:15:46 EST
(In reply to Peter Lemenkov from comment #2)
> Fix was backported to 1.10.3

That's fantastic news but doesn't mean you can close the bug.  Please leave it open.  This affects more than Fedora (if Fedora is fixed, feel free to note that in the _Fedora_ bug, not this one).

Thanks.
Comment 4 Vincent Danen 2013-12-18 13:59:38 EST
External References:

http://www.wireshark.org/security/wnpa-sec-2013-68.html
Comment 6 Huzaifa S. Sidhpurwala 2013-12-19 01:16:29 EST
Upstream patch:

http://anonsvn.wireshark.org/viewvc?view=revision&revision=53626
Comment 7 Huzaifa S. Sidhpurwala 2013-12-19 01:18:35 EST
Statement:

This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5.
Comment 11 errata-xmlrpc 2014-03-31 12:38:03 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:0342 https://rhn.redhat.com/errata/RHSA-2014-0342.html

Note You need to log in before you can comment on or make changes to this bug.