Security update for wireshark
Announcement ID: | SUSE-SU-2018:0054-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 11 vulnerabilities can now be installed.
Description:
This update for wireshark to version 2.2.11 fixes several issues.
These security issues were fixed:
- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop. This was addressed by adding length validation (bsc#1056248)
- CVE-2017-13766: The Profinet I/O dissector could have crash with an out-of-bounds write. This was addressed by adding string validation (bsc#1056249)
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application crash. This was addressed by adding length validation (bsc#1056251)
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote attackers to cause a denial of service (stack exhaustion) in the dissect_IODWriteReq function (bsc#1045341)
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP dissector (bsc#1044417)
- CVE-2017-15192: The BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level. (bsc#1062645)
- CVE-2017-15193: The MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach. (bsc#1062645)
- CVE-2017-15191: The DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length. (bsc#1062645)
- CVE-2017-17083: NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer. (bsc#1070727)
- CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length. (bsc#1070727)
- CVE-2017-17085: the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length. (bsc#1070727)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Development Kit 11 SP4
zypper in -t patch sdksp4-wireshark-13400=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-wireshark-13400=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-wireshark-13400=1
Package List:
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- libsmi-0.4.5-2.7.2.1
- portaudio-19-234.18.1
- portaudio-devel-19-234.18.1
- wireshark-devel-2.2.11-40.14.5
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (x86_64 i586)
- libwireshark8-2.2.11-40.14.5
- libwsutil7-2.2.11-40.14.5
- libwiretap6-2.2.11-40.14.5
- libwscodecs1-2.2.11-40.14.5
- wireshark-2.2.11-40.14.5
- wireshark-gtk-2.2.11-40.14.5
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- portaudio-19-234.18.1
- libwireshark8-2.2.11-40.14.5
- libwsutil7-2.2.11-40.14.5
- libsmi-0.4.5-2.7.2.1
- libwiretap6-2.2.11-40.14.5
- libwscodecs1-2.2.11-40.14.5
- wireshark-2.2.11-40.14.5
- wireshark-gtk-2.2.11-40.14.5
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- portaudio-19-234.18.1
- libwireshark8-2.2.11-40.14.5
- libwsutil7-2.2.11-40.14.5
- libsmi-0.4.5-2.7.2.1
- libwiretap6-2.2.11-40.14.5
- libwscodecs1-2.2.11-40.14.5
- wireshark-2.2.11-40.14.5
- wireshark-gtk-2.2.11-40.14.5
References:
- https://www.suse.com/security/cve/CVE-2017-13765.html
- https://www.suse.com/security/cve/CVE-2017-13766.html
- https://www.suse.com/security/cve/CVE-2017-13767.html
- https://www.suse.com/security/cve/CVE-2017-15191.html
- https://www.suse.com/security/cve/CVE-2017-15192.html
- https://www.suse.com/security/cve/CVE-2017-15193.html
- https://www.suse.com/security/cve/CVE-2017-17083.html
- https://www.suse.com/security/cve/CVE-2017-17084.html
- https://www.suse.com/security/cve/CVE-2017-17085.html
- https://www.suse.com/security/cve/CVE-2017-9617.html
- https://www.suse.com/security/cve/CVE-2017-9766.html
- https://bugzilla.suse.com/show_bug.cgi?id=1044417
- https://bugzilla.suse.com/show_bug.cgi?id=1045341
- https://bugzilla.suse.com/show_bug.cgi?id=1056248
- https://bugzilla.suse.com/show_bug.cgi?id=1056249
- https://bugzilla.suse.com/show_bug.cgi?id=1056251
- https://bugzilla.suse.com/show_bug.cgi?id=1062645
- https://bugzilla.suse.com/show_bug.cgi?id=1070727