Hide Forgot
A stack-based buffer over-read flaw was found in the way Wireshark performed management of testy, virtualizable buffers. A remote attacker could create a specially-crafted capture file, which once opened, by a local, unsuspecting user could lead to wireshark application crash. References: [1] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5912 (upstream bug report) [2] https://bugs.wireshark.org/bugzilla/attachment.cgi?id=6335 (public reproducer) [3] http://www.openwall.com/lists/oss-security/2011/05/31/20 (CVE request) [4] http://www.wireshark.org/security/wnpa-sec-2011-07.html (upstream advisory) Upstream patch: [5] http://anonsvn.wireshark.org/viewvc?view=revision&revision=37068
This issue affects the versions of the wireshark package, as shipped with Red Hat Enterprise Linux 4, 5, and 6. -- This issue affects the versions of the wireshark package, as shipped with Fedora release of 13, 14, and 16.
Note: This issue is only specific to the snoop capture file format and does not appear to be triggered by any other formats wireshark supports.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0509 https://rhn.redhat.com/errata/RHSA-2012-0509.html
Current Fedora has wireshark 1.4.12, which is not affected by this flaw.
Acknowledgements: This issue was discovered by Huzaifa Sidhpurwala of the Red Hat Security Response Team.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:0125 https://rhn.redhat.com/errata/RHSA-2013-0125.html
Statement: (none)