Common Vulnerabilities and Exposures assigned an identifier CVE-2013-4933 to the following vulnerability: The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file. References: [1] http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673 [2] http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673 [3] http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html [4] http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html [5] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742 [6] https://www.wireshark.org/security/wnpa-sec-2013-51.html
Created wireshark tracking bugs for this issue: Affects: fedora-18 [bug 990189]
Statement: (none)
wireshark-1.10.2-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-7.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1569 https://rhn.redhat.com/errata/RHSA-2013-1569.html
wireshark-1.10.2-4.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2014:0341 https://rhn.redhat.com/errata/RHSA-2014-0341.html