A denial of service flaw was found in the Wireshark's sFlow dissector. A remote attacker could provide a specially-crafted sFlow packet capture file, which once opened by an unsuspecting user would utilize an excessive amount of CPU and memory. References: ----------- http://www.wireshark.org/security/wnpa-sec-2009-04.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3570 Reproducer: ----------- https://bugs.wireshark.org/bugzilla/attachment.cgi?id=3177 Upstream patch: --------------- http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-sflow.c?r1=28897&r2=28896&pathrev=28897&view=patch
This issue does NOT affect the versions of the wireshark package, as shipped with Red Hat Enterprise Linux 3, 4, and 5. This issue does NOT affect the version of the wireshark package, as shipped with Fedora release of 10. This issue affects the versions of the wireshark package, as shipped with Fedora releases of 11 and Rawhide.
MITRE's CVE-2009-2561 entry: Unspecified vulnerability in the sFlow dissector in Wireshark 1.2.0 allows remote attackers to cause a denial of service (CPU and memory consumption) via unspecified vectors. References: ---------- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2561 http://www.wireshark.org/security/wnpa-sec-2009-04.html http://www.securityfocus.com/bid/35748 http://secunia.com/advisories/35884 http://www.vupen.com/english/advisories/2009/1970
Official statement from Red Hat Security Response Team regarding this issue: ---------------------------------------------------------------------------- Not vulnerable. This issue did not affect the versions of the Wireshark package, as shipped with Red Hat Enterprise Linux 3, 4, or 5.
wireshark-1.2.2-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.2.1-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.