Hide Forgot
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-4080 to the following vulnerability: The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet. References: [1] http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-assa_r3.c?r1=49744&r2=49743&pathrev=49744 [2] http://anonsvn.wireshark.org/viewvc?view=revision&revision=49744 [3] http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html [4] http://www.wireshark.org/security/wnpa-sec-2013-38.html [5] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8764
This issue affects the versions of the wireshark package, as shipped with Fedora release of 17 and 18. Please schedule an update.
Created wireshark tracking bugs for this issue Affects: fedora-17 [bug 972760]
Created wireshark tracking bugs for this issue Affects: fedora-18 [bug 972762]
The version of wireshark shipped with Red Hat Enterprise Linux 5 and 6 does not have support for Assa Abloy R3 Protocol. Therefore this flaw does not affect these versions.
Statement: Not Vulnerable. This issue does not affect the version of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.
External References: http://www.wireshark.org/security/wnpa-sec-2013-38.html
wireshark-1.10.2-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-7.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-4.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.