U programskom paketu Wireshark otkrivene su tri sigurnosne ranjivosti koje se mogu iskoristiti za udaljeno izvođenje DoS (eng. Denial of Service) napada.
Jedna od ranjivosti očituje se kao preljev međuspremnika u RLC komponenti. Ostale ranjivosti povezane s nepravilnom provjerom duljine primljenih paketa i neodgovarajućim rukovanjem NULL pokazivača.
Posljedica:
Navođenjem korisnika na otvaranje posebno oblikovanog paketa, udaljeni napadač može izvesti DoS napad.
Rješenje:
Korisnicima se savjetuje korištenje najnovije inačice paketa Wireshark.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-0440
2012-01-14 03:35:41
--------------------------------------------------------------------------------
Name : wireshark
Product : Fedora 15
Version : 1.4.11
Release : 1.fc15
URL : http://www.wireshark.org/
Summary : Network traffic analyzer
Description :
Wireshark is a network traffic analyzer for Unix-ish operating systems.
This package lays base for libpcap, a packet capture and filtering
library, contains command-line utilities, contains plugins and
documentation for wireshark. A graphical user interface is packaged
separately to GTK+ package.
--------------------------------------------------------------------------------
Update Information:
The following vulnerabilities have been fixed.
wnpa-sec-2012-01
Laurent Butti discovered that Wireshark failed to properly record sizes for many
packet capture file formats.
wnpa-sec-2012-02
Wireshark could dereference a NULL pointer and crash
wnpa-sec-2012-03
The RLC dissector could overflow a buffer
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jan 11 2012 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.11-1
- upgrade to 1.4.11
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.11.html
* Fri Dec 2 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.10-2
- fixed display of error message boxes on startup in gnome3 (#752559)
* Wed Nov 2 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.10-1
- upgrade to 1.4.10
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.10.html
* Fri Sep 9 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.9-1
- upgrade to 1.4.9
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.9.html
* Thu Jul 21 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.8-1
- upgrade to 1.4.8
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.8.html
* Thu Jun 16 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.7-2
- fixed Fedora-specific message when user is not part of 'wireshark' group
- now it does not contain '<' and '>' characters (#713545)
* Thu Jun 2 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.7-1
- upgrade to 1.4.7
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.7.html
* Thu May 19 2011 Steve Dickson <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.6-3
- Improved the NFS4.1 patcket dissectors
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #773726 - CVE-2012-0041 wireshark: multiple file parser
vulnerabilities (wnpa-sec-2012-01)
https://bugzilla.redhat.com/show_bug.cgi?id=773726
[ 2 ] Bug #773728 - CVE-2012-0042 wireshark: NULL pointer vulnerabilities
(wnpa-sec-2012-02)
https://bugzilla.redhat.com/show_bug.cgi?id=773728
[ 3 ] Bug #773729 - CVE-2012-0043 wireshark: RLC dissector buffer overflow
(wnpa-sec-2012-03)
https://bugzilla.redhat.com/show_bug.cgi?id=773729
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update wireshark' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke