Red Hat Bugzilla – Bug 549578
CVE-2009-4377 wireshark: invalid pointer dereference in SMB/SMB2 dissectors
Last modified: 2012-06-20 10:42:35 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-4377 to
the following vulnerability:
Reference: CONFIRM: http://www.wireshark.org/security/wnpa-sec-2009-09.html
Reference: CONFIRM: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4301
Reference: URL: http://www.securityfocus.com/bid/37407
Reference: URL: http://osvdb.org/61178
Reference: URL: http://www.securitytracker.com/id?1023374
Reference: URL: http://secunia.com/advisories/37842
Reference: URL: http://www.vupen.com/english/advisories/2009/3596
The (1) SMB and (2) SMB2 dissectors in Wireshark 0.9.0 through 1.2.4
allow remote attackers to cause a denial of service (crash) via a
crafted packet, as demonstrated by fuzz-2009-12-07-11141.pcap.
Created attachment 379748 [details]
upstream patch to correct the issue
This is corrected in the upstream 1.2.5 release of wireshark.
This release also corrected CVE-2009-4376 (buffer overflow in the daintree_sna_read function), but only affected versions 1.2.0 through 1.2.4 and as such did not affect Red Hat Enterprise Linux. This CVE does affect Fedora 11 and 12.
It also corrected CVE-2009-4378 (IPMI dissector could crash when running on Windows), but only affected versions 1.2.0 through 1.2.4 on the Windows operating system.
CVE-2009-4377 does affect Red Hat Enterprise Linux 4 and 5.
wireshark-1.2.5-3.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
This has been corrected upstream in the 1.0.x branch (1.0.11):
The SMB and SMB2 dissectors could crash.
Fixed in trunk: r31187
Fixed in trunk-1.2: r31211
Fixed in trunk-1.0: pending
Versions affected: 0.9.0 to 1.0.10, 1.2.0 to 1.2.4
This issue has been addressed in following products:
Red Hat Enterprise Linux 4
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 3
Via RHSA-2010:0360 https://rhn.redhat.com/errata/RHSA-2010-0360.html