Bug 881742 - (CVE-2012-5600, CVE-2012-6062) CVE-2012-5600 CVE-2012-6062 wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)
CVE-2012-5600 CVE-2012-6062 wireshark: DoS (infinite loop) in the RTCP dissec...
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 881873 994924 1004712 1074904 1074905
Blocks: 881865 974906
  Show dependency treegraph
Reported: 2012-11-29 08:54 EST by Jan Lieskovsky
Modified: 2016-03-04 07:03 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2014-03-31 15:12:38 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2012-11-29 08:54:19 EST
A denial of service flaw was found in the way RTCP dissector of Wireshark, a network traffic analyzer, performed dissection of certain RTCP packet capture files. A remote attacker could provide a specially-crafted RTCP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.

Upstream bug report:
[1] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7879

[2] http://www.wireshark.org/security/wnpa-sec-2012-38.html
[3] http://www.wireshark.org/docs/relnotes/wireshark-1.6.12.html
[4] http://www.wireshark.org/docs/relnotes/wireshark-1.8.4.html

Relevant upstream patch:
[5] http://anonsvn.wireshark.org/viewvc?view=revision&revision=45717

[6] http://www.wireshark.org/download/automated/captures/fuzz-2012-10-19-32463.pcap
Comment 1 Jan Lieskovsky 2012-11-29 09:06:20 EST
This issue affects the versions of the wireshark package, as shipped with Red Hat Enterprise Linux 5 and 6.


This issue affects the versions of the wireshark package, as shipped with Fedora release of 16 and 17.
Comment 2 Jan Lieskovsky 2012-11-29 12:50:01 EST
Created wireshark tracking bugs for this issue

Affects: fedora-all [bug 881873]
Comment 3 Vincent Danen 2012-11-29 17:13:51 EST
This was assigned CVE-2012-5600:

Comment 4 Huzaifa S. Sidhpurwala 2012-11-29 23:33:06 EST
Statement CVE-2012-6062:

Comment 5 Jan Lieskovsky 2012-12-05 08:53:29 EST
The CVE-2012-5600 identifier has been rejected by Mitre in favour of CVE-2012-6062 one:

Name: CVE-2012-5600

** REJECT **

DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6062.  Reason:
This candidate is a reservation duplicate of CVE-2012-6062.  Notes:
All CVE users should reference CVE-2012-6062 instead of this
candidate.  All references and descriptions in this candidate have
been removed to prevent accidental usage.


The correct CVE id this particular wireshark flaw should be referenced under (from now on) is CVE-2012-6062.
Comment 9 errata-xmlrpc 2013-11-21 02:30:50 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:1569 https://rhn.redhat.com/errata/RHSA-2013-1569.html
Comment 11 errata-xmlrpc 2014-03-31 14:00:17 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2014:0341 https://rhn.redhat.com/errata/RHSA-2014-0341.html

Note You need to log in before you can comment on or make changes to this bug.