U radu programskog paketa Wireshark, za operacijske sustave Fedora 13 i 14, otkriven je niz sigurnosnih propusta. Wireshark je popularni alat za analizu mrežnog prometa. Propusti su posljedica nepravilnosti u radu funkcija "dissect_ber_unknown()", "dissect_ms_compressed_string()", "dissect_mscldap_string", "dissect_6lowpan_iphc()", i dr. Ovi propusti napadaču omogućuju izvođenje DoS (eng. Denial of Service) napada. Za uvid u detalje svih propusta savjetuje se pregledati izvorne preporuke. Korisnicima se savjetuje instalacija dostupne nadogradnje.

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-2620
2011-03-04 09:41:39
--------------------------------------------------------------------------------

Name        : wireshark
Product     : Fedora 13
Version     : 1.2.15
Release     : 1.fc13
URL         : http://www.wireshark.org/
Summary     : Network traffic analyzer
Description :
Wireshark is a network traffic analyzer for Unix-ish operating systems.

This package lays base for libpcap, a packet capture and filtering
library, contains command-line utilities, contains plugins and
documentation for wireshark. A graphical user interface is packaged
separately to GTK+ package.

--------------------------------------------------------------------------------
Update Information:

Several security bugs were fixed in this release:
* CVE-2011-0538: memory corruption when reading a malformed pcap file
* CVE-2010-3445: stack overflow in BER dissector
* CVE-2011-1143: Null pointer dereference causing application crash when
reading malformed pcap file
* CVE-2011-1140: Multiple stack consumption vulnerabilities caused DoS via
crafted SMB or CLDAP packet
* CVE-2011-1141: Malformed LDAP filter string causes Denial of Service via
excessive memory consumption
* CVE-2011-1138: Off-by-one error in the dissect_6lowpan_iphc function causes
application crash (Denial Of Service)
* CVE-2011-1139: Denial Of Service (application crash) via a pcap-ng file that
contains a large packet-length field
* CVE-2011-0713: heap-based buffer overflow when reading malformed Nokia DCT3
phone signalling traces
--------------------------------------------------------------------------------
ChangeLog:

* Thu Mar  3 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.2.15-1
- upgrade to 1.2.15
- see http://www.wireshark.org/docs/relnotes/wireshark-1.2.15.html
* Mon Jan 17 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.2.14-1
- upgrade to 1.2.14
- see http://www.wireshark.org/docs/relnotes/wireshark-1.2.14.html
* Wed Jan  5 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.2.13-2
- fixed buffer overflow in ENTTEC dissector (#666897)
* Mon Nov 22 2010 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.2.13-1
- upgrade to 1.2.13
- see http://www.wireshark.org/docs/relnotes/wireshark-1.2.13.html
* Mon Sep 13 2010 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.2.11-1
- upgrade to 1.2.11
- see http://www.wireshark.org/docs/relnotes/wireshark-1.2.11.html
- Resolves: #632539
* Tue Aug 24 2010 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.2.10-1
- upgrade to 1.2.10
- see http://www.wireshark.org/docs/relnotes/wireshark-1.2.10.html
- Resolves: #625940 CVE-2010-2287 CVE-2010-2286 CVE-2010-2284 CVE-2010-2283
* Mon May 17 2010 Radek Vokal <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.2.8-3
- removing traling bracket from python_sitearch (#592391)
* Fri May  7 2010 Radek Vokal <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.2.8-2
- add libtool patch
* Fri May  7 2010 Radek Vokal <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.2.8-1
- use sitearch instead of sitelib to avoid pyo and pyc conflicts
- upgrade to 1.2.8
- see http://www.wireshark.org/docs/relnotes/wireshark-1.2.8.html
- rebuild with GeoIP support (needs to be turned on in IP protocol
preferences)
- bring back -pie
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #676232 - CVE-2011-0538 Wireshark: memory corruption when reading a
malformed pcap file (upstream bug #5652)
        https://bugzilla.redhat.com/show_bug.cgi?id=676232
  [ 2 ] Bug #678198 - CVE-2011-0713 Wireshark: heap-based buffer overflow when
reading malformed Nokia DCT3 phone signalling traces
        https://bugzilla.redhat.com/show_bug.cgi?id=678198
  [ 3 ] Bug #639486 - CVE-2010-3445 wireshark: stack overflow in BER dissector
        https://bugzilla.redhat.com/show_bug.cgi?id=639486
  [ 4 ] Bug #681760 - CVE-2011-1143 Wireshark: Null pointer dereference causing
application crash when reading malformed pcap file
        https://bugzilla.redhat.com/show_bug.cgi?id=681760
  [ 5 ] Bug #681754 - CVE-2011-1140 Wireshark: Multiple stack consumption
vulnerabilities caused DoS via crafted SMB or CLDAP packet
        https://bugzilla.redhat.com/show_bug.cgi?id=681754
  [ 6 ] Bug #681753 - CVE-2011-1138 Wireshark: Off-by-one error in the
dissect_6lowpan_iphc function causes application crash (Denial Of Service)
        https://bugzilla.redhat.com/show_bug.cgi?id=681753
  [ 7 ] Bug #681748 - CVE-2011-1139 Wireshark: Denial Of Service (application
crash) via a pcap-ng file that contains a large packet-length field
        https://bugzilla.redhat.com/show_bug.cgi?id=681748
  [ 8 ] Bug #681756 - CVE-2011-1141 Wireshark: Malformed LDAP filter string
causes Denial of Service via excessive memory consumption
        https://bugzilla.redhat.com/show_bug.cgi?id=681756
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update wireshark' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-2632
2011-03-04 09:42:09
--------------------------------------------------------------------------------

Name        : wireshark
Product     : Fedora 14
Version     : 1.4.4
Release     : 1.fc14
URL         : http://www.wireshark.org/
Summary     : Network traffic analyzer
Description :
Wireshark is a network traffic analyzer for Unix-ish operating systems.

This package lays base for libpcap, a packet capture and filtering
library, contains command-line utilities, contains plugins and
documentation for wireshark. A graphical user interface is packaged
separately to GTK+ package.

--------------------------------------------------------------------------------
Update Information:

Several security bugs were fixed in this release:
* CVE-2011-0538: memory corruption when reading a malformed pcap file
* CVE-2010-3445: stack overflow in BER dissector
* CVE-2011-1143: Null pointer dereference causing application crash when
reading malformed pcap file
* CVE-2011-1140: Multiple stack consumption vulnerabilities caused DoS via
crafted SMB or CLDAP packet
* CVE-2011-1141: Malformed LDAP filter string causes Denial of Service via
excessive memory consumption
* CVE-2011-1138: Off-by-one error in the dissect_6lowpan_iphc function causes
application crash (Denial Of Service)
* CVE-2011-1139: Denial Of Service (application crash) via a pcap-ng file that
contains a large packet-length field
* CVE-2011-0713: heap-based buffer overflow when reading malformed Nokia DCT3
phone signalling traces
--------------------------------------------------------------------------------
ChangeLog:

* Thu Mar  3 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.>
- upgrade to 1.4.4
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.4.html
* Mon Jan 17 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.2-3
- upgrade to 1.4.3
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.3.html
* Wed Jan  5 2011 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.2-2
- fixed buffer overflow in ENTTEC dissector (#666897)
* Mon Nov 22 2010 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.2-1
- upgrade to 1.4.2
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.2.html
* Mon Nov  1 2010 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.1-2
- temporarily disable zlib until
  https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4955 is resolved
(#643461)
* Fri Oct 22 2010 Jan Safranek <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.4.1-1
- upgrade to 1.4.1
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.1.html
- Own the %{_libdir}/wireshark dir (#644508)
- associate *.pcap files with wireshark (#641163)
* Tue Oct  5 2010 jkeating - 1.4.0-2.1
- Rebuilt for gcc bug 634757
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #676232 - CVE-2011-0538 Wireshark: memory corruption when reading a
malformed pcap file (upstream bug #5652)
        https://bugzilla.redhat.com/show_bug.cgi?id=676232
  [ 2 ] Bug #678198 - CVE-2011-0713 Wireshark: heap-based buffer overflow when
reading malformed Nokia DCT3 phone signalling traces
        https://bugzilla.redhat.com/show_bug.cgi?id=678198
  [ 3 ] Bug #639486 - CVE-2010-3445 wireshark: stack overflow in BER dissector
        https://bugzilla.redhat.com/show_bug.cgi?id=639486
  [ 4 ] Bug #681760 - CVE-2011-1143 Wireshark: Null pointer dereference causing
application crash when reading malformed pcap file
        https://bugzilla.redhat.com/show_bug.cgi?id=681760
  [ 5 ] Bug #681754 - CVE-2011-1140 Wireshark: Multiple stack consumption
vulnerabilities caused DoS via crafted SMB or CLDAP packet
        https://bugzilla.redhat.com/show_bug.cgi?id=681754
  [ 6 ] Bug #681753 - CVE-2011-1138 Wireshark: Off-by-one error in the
dissect_6lowpan_iphc function causes application crash (Denial Of Service)
        https://bugzilla.redhat.com/show_bug.cgi?id=681753
  [ 7 ] Bug #681748 - CVE-2011-1139 Wireshark: Denial Of Service (application
crash) via a pcap-ng file that contains a large packet-length field
        https://bugzilla.redhat.com/show_bug.cgi?id=681748
  [ 8 ] Bug #681756 - CVE-2011-1141 Wireshark: Malformed LDAP filter string
causes Denial of Service via excessive memory consumption
        https://bugzilla.redhat.com/show_bug.cgi?id=681756
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update wireshark' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce

Idi na vrh