Uočene su greške u funkcijama "dissect_pft" i "dissect_stun_message", programskim komponentama "epan/dissectors/packet-afp.c", komponentama za raščlanjivanje CTDB i CIP, cjelobrojno prepisivanje u funkciji "dissect_pft" te preljev međuspremnika u datoteci "epan/dissectors/packet-rtps2.c".
Posljedica:
Opisane nedostatke udaljeni napadač može iskoristiti kako bi izvršio napad uskraćivanjem usluga (eng. Denial of Service, DoS).
Rješenje:
Preporuča se korištenje nove, ispravljene inačice programskog paketa.
Announcement ID: openSUSE-SU-2012:1035-1
Rating: moderate
References: #776083
Cross-References: CVE-2012-4285 CVE-2012-4288 CVE-2012-4289
CVE-2012-4290 CVE-2012-4291 CVE-2012-4292
CVE-2012-4293 CVE-2012-4296
Affected Products:
openSUSE 12.1
openSUSE 11.4
______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available.
Description:
wireshark was updated to 1.4.15
* The DCP ETSI dissector could trigger a zero division.
(wnpa-sec-2012-13 CVE-2012-4285)
* The XTP dissector could go into an infinite loop.
(wnpa-sec-2012-15 CVE-2012-4288)
* The AFP dissector could go into a large loop.
(wnpa-sec-2012-17 CVE-2012-4289)
* The RTPS2 dissector could overflow a buffer.
(wnpa-sec-2012-18 CVE-2012-4296)
* The CIP dissector could exhaust system memory.
(wnpa-sec-2012-20 CVE-2012-4291)
* The STUN dissector could crash. (wnpa-sec-2012-21
CVE-2012-4292)
* The EtherCAT Mailbox dissector could abort.
(wnpa-sec-2012-22 CVE-2012-4293)
* The CTDB dissector could go into a large loop.
(wnpa-sec-2012-23 CVE-2012-4290)
Further bug fixes and updated protocol support as listed
in:
http://www.wireshark.org/docs/relnotes/wireshark-1.4.15.html
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.1:
zypper in -t patch openSUSE-2012-526
- openSUSE 11.4:
zypper in -t patch openSUSE-2012-526
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.1 (i586 x86_64):
wireshark-1.4.15-3.20.1
wireshark-debuginfo-1.4.15-3.20.1
wireshark-debugsource-1.4.15-3.20.1
wireshark-devel-1.4.15-3.20.1
- openSUSE 11.4 (i586 x86_64):
wireshark-1.4.15-0.22.1
wireshark-debuginfo-1.4.15-0.22.1
wireshark-debugsource-1.4.15-0.22.1
wireshark-devel-1.4.15-0.22.1
References:
http://support.novell.com/security/cve/CVE-2012-4285.html
http://support.novell.com/security/cve/CVE-2012-4288.html
http://support.novell.com/security/cve/CVE-2012-4289.html
http://support.novell.com/security/cve/CVE-2012-4290.html
http://support.novell.com/security/cve/CVE-2012-4291.html
http://support.novell.com/security/cve/CVE-2012-4292.html
http://support.novell.com/security/cve/CVE-2012-4293.html
http://support.novell.com/security/cve/CVE-2012-4296.html
https://bugzilla.novell.com/776083
Posljednje sigurnosne preporuke