Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1142606 - (CVE-2014-6426) CVE-2014-6426 wireshark: HIP dissector infinite loop (wnpa-sec-2014-16)
CVE-2014-6426 wireshark: HIP dissector infinite loop (wnpa-sec-2014-16)
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140814,repor...
: Security
Depends On: 1148264 1148265 1148266 1148267 1148277
Blocks: 1142615
  Show dependency treegraph
 
Reported: 2014-09-17 02:08 EDT by Murray McAllister
Modified: 2015-11-25 05:13 EST (History)
8 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-10-22 07:57:06 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1676 normal SHIPPED_LIVE Moderate: wireshark security update 2014-10-21 20:22:29 EDT

  None (edit)
Description Murray McAllister 2014-09-17 02:08:54 EDT
An infinite loop issue was discovered in Wireshark's HIP dissector. It may be possible to make Wireshark consume an excessive amount of CPU by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

This is reported to affect version 1.12.0. This version is not shipped in Fedora or Red Hat Enterprise Linux.

External References:

https://www.wireshark.org/security/wnpa-sec-2014-16.html
Comment 1 Siddharth Sharma 2014-09-29 08:43:27 EDT
I dont see any upstream bugzilla assigned to it , but here is the upstream fix

https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commitdiff;h=d9e5021fe79973d00ddd8fcef0bbefbaae63dd0f;hp=20721cbcbf76665b625d5b1243648c9a3ccc403d
Comment 3 Siddharth Sharma 2014-10-01 02:07:56 EDT
Created wireshark tracking bugs for this issue:

Affects: fedora-all [bug 1148277]
Comment 4 errata-xmlrpc 2014-10-21 16:22:52 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2014:1676 https://rhn.redhat.com/errata/RHSA-2014-1676.html

Note You need to log in before you can comment on or make changes to this bug.