Hide Forgot
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-4929 to the following vulnerability: The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet. References: [1] http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dis-pdus.c?r1=50450&r2=50449&pathrev=50450 [2] http://anonsvn.wireshark.org/viewvc?view=revision&revision=50450 [3] http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html [4] http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html [5] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8911 [6] https://www.wireshark.org/security/wnpa-sec-2013-47.html
Created wireshark tracking bugs for this issue: Affects: fedora-18 [bug 990189]
Statement: Not Vulnerable. This issue does not affect the version of wireshark, as shipped with Red Hat Enterprise Linux 5 and 6.
wireshark-1.10.2-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-7.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-4.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.