Hide Forgot
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-4076 to the following vulnerability: Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet. References: [1] http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ppp.c?r1=46128&r2=46127&pathrev=46128 [2] http://anonsvn.wireshark.org/viewvc?view=revision&revision=46128 [3] http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html [4] http://www.wireshark.org/security/wnpa-sec-2013-34.html [5] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7880 [6] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8727
This issue affects the versions of the wireshark package, as shipped with Fedora release of 17 and 18. Please schedule an update.
Created wireshark tracking bugs for this issue Affects: fedora-17 [bug 972760]
Created wireshark tracking bugs for this issue Affects: fedora-18 [bug 972762]
Statement: Not Vulnerable. This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.
External References: http://www.wireshark.org/security/wnpa-sec-2013-34.html
wireshark-1.10.2-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-7.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-4.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.