Common Vulnerabilities and Exposures assigned an identifier CVE-2013-4931 to the following vulnerability: epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector. References: [1] http://anonsvn.wireshark.org/viewvc/trunk/epan/proto.c?r1=50504&r2=50503&pathrev=50504 [2] http://anonsvn.wireshark.org/viewvc?view=revision&revision=50504 [3] http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html [4] http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html [5] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8923 [6] https://www.wireshark.org/security/wnpa-sec-2013-49.html
Created wireshark tracking bugs for this issue: Affects: fedora-18 [bug 990189]
Statement: (none)
wireshark-1.10.2-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-7.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1569 https://rhn.redhat.com/errata/RHSA-2013-1569.html
wireshark-1.10.2-4.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2014:0341 https://rhn.redhat.com/errata/RHSA-2014-0341.html