Hide Forgot
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-4074 to the following vulnerability: The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. References: [1] http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-capwap.c?r1=43716&r2=43715&pathrev=43716 [2] http://anonsvn.wireshark.org/viewvc?view=revision&revision=43716 [3] http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html [4] http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html [5] http://www.wireshark.org/security/wnpa-sec-2013-32.html [6] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8725
This issue affects the versions of the wireshark package, as shipped with Fedora release of 17 and 18. Please schedule an update.
Created wireshark tracking bugs for this issue Affects: fedora-17 [bug 972760]
Created wireshark tracking bugs for this issue Affects: fedora-18 [bug 972762]
The version of wireshark shipped with Red Hat Enterprise Linux 5 and 6 does not have support for Control And Provisioning of Wireless Access Points (CAPWAP) Protocol. Therefore this flaw does not affect these versions.
Statement: Not Vulnerable. This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.
External References: http://www.wireshark.org/security/wnpa-sec-2013-32.html
wireshark-1.10.2-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-7.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-4.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.