rhsa-2014_0341
Vulnerability from csaf_redhat
Published
2014-03-31 16:31
Modified
2024-12-02 06:56
Summary
Red Hat Security Advisory: wireshark security update
Notes
Topic
Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Wireshark is a network protocol analyzer. It is used to capture and browse
the traffic running on a computer network.
Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash or,
possibly, execute arbitrary code as the user running Wireshark.
(CVE-2013-3559, CVE-2013-4083, CVE-2014-2281, CVE-2014-2299)
Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2012-5595, CVE-2012-5598, CVE-2012-5599,
CVE-2012-5600, CVE-2012-6056, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,
CVE-2013-3557, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931, CVE-2013-4932,
CVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-5721, CVE-2013-7112)
All Wireshark users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. All running instances
of Wireshark must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated wireshark packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Wireshark is a network protocol analyzer. It is used to capture and browse\nthe traffic running on a computer network.\n\nMultiple flaws were found in Wireshark. If Wireshark read a malformed\npacket off a network or opened a malicious dump file, it could crash or,\npossibly, execute arbitrary code as the user running Wireshark.\n(CVE-2013-3559, CVE-2013-4083, CVE-2014-2281, CVE-2014-2299)\n\nSeveral denial of service flaws were found in Wireshark. Wireshark could\ncrash or stop responding if it read a malformed packet off a network, or\nopened a malicious dump file. (CVE-2012-5595, CVE-2012-5598, CVE-2012-5599,\nCVE-2012-5600, CVE-2012-6056, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,\nCVE-2013-3557, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931, CVE-2013-4932,\nCVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-5721, CVE-2013-7112)\n\nAll Wireshark users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. All running instances\nof Wireshark must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0341", "url": "https://access.redhat.com/errata/RHSA-2014:0341" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "881742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742" }, { "category": "external", "summary": "881748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748" }, { "category": "external", "summary": "881771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771" }, { "category": "external", "summary": "881809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809" }, { "category": "external", "summary": "965190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965190" }, { "category": "external", "summary": "965193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965193" }, { "category": "external", "summary": "972686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972686" }, { "category": "external", "summary": "972688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972688" }, { "category": "external", "summary": "990166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990166" }, { "category": "external", "summary": "990170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990170" }, { "category": "external", "summary": "990172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990172" }, { "category": "external", "summary": "990175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990175" }, { "category": "external", "summary": "990178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990178" }, { "category": "external", "summary": "990179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990179" }, { "category": "external", "summary": "1007197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197" }, { "category": "external", "summary": "1044508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044508" }, { "category": "external", "summary": "1074109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074109" }, { "category": "external", "summary": "1074114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074114" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0341.json" } ], "title": "Red Hat Security Advisory: wireshark security update", "tracking": { "current_release_date": "2024-12-02T06:56:26+00:00", "generator": { "date": "2024-12-02T06:56:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0341", "initial_release_date": "2014-03-31T16:31:57+00:00", "revision_history": [ { "date": "2014-03-31T16:31:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-03-31T16:31:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-02T06:56:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wireshark-gnome-0:1.0.15-6.el5_10.i386", "product": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.i386", "product_id": "wireshark-gnome-0:1.0.15-6.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=i386" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "product": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=i386" } } }, { "category": "product_version", "name": "wireshark-0:1.0.15-6.el5_10.i386", "product": { "name": "wireshark-0:1.0.15-6.el5_10.i386", "product_id": "wireshark-0:1.0.15-6.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "product": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "product_id": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "product": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-0:1.0.15-6.el5_10.x86_64", "product": { "name": "wireshark-0:1.0.15-6.el5_10.x86_64", "product_id": "wireshark-0:1.0.15-6.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wireshark-0:1.0.15-6.el5_10.src", "product": { "name": "wireshark-0:1.0.15-6.el5_10.src", "product_id": "wireshark-0:1.0.15-6.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64", "product": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64", "product_id": "wireshark-gnome-0:1.0.15-6.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "wireshark-0:1.0.15-6.el5_10.ia64", "product": { "name": "wireshark-0:1.0.15-6.el5_10.ia64", "product_id": "wireshark-0:1.0.15-6.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "product": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc", "product": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc", "product_id": "wireshark-gnome-0:1.0.15-6.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "wireshark-0:1.0.15-6.el5_10.ppc", "product": { "name": "wireshark-0:1.0.15-6.el5_10.ppc", "product_id": "wireshark-0:1.0.15-6.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "product": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x", "product": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x", "product_id": "wireshark-gnome-0:1.0.15-6.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-0:1.0.15-6.el5_10.s390x", "product": { "name": "wireshark-0:1.0.15-6.el5_10.s390x", "product_id": "wireshark-0:1.0.15-6.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "product": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.src", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64" }, "product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" }, "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-5595", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "881809" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2012-6056. Note: All CVE users should reference CVE-2012-6056 instead of this candidate.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5595" }, { "category": "external", "summary": "RHBZ#881809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5595", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5595" } ], "release_date": "2012-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)" }, { "cve": "CVE-2012-5598", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "881771" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] An integer overflow vulnerability has been identified in the dissect_iscsi_pdu() function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark. A remote attacker could provide a specially-crafted iSCSI packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)", "title": "Vulnerability summary" }, { "category": "other", "text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6060. Note: All CVE users should reference CVE-2012-6060 instead of this candidate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5598" }, { "category": "external", "summary": "RHBZ#881771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5598", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5598" } ], "release_date": "2012-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)" }, { "cve": "CVE-2012-5599", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "881748" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] A denial of service flaw was found in the way WTP dissector of Wireshark, a network traffic analyzer, performed dissection of certain WTP packet capture files. A remote attacker could provide a specially-crafted WTP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)", "title": "Vulnerability summary" }, { "category": "other", "text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6061. Note: All CVE users should reference CVE-2012-6061 instead of this candidate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5599" }, { "category": "external", "summary": "RHBZ#881748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5599", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5599" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5599", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5599" } ], "release_date": "2012-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)" }, { "cve": "CVE-2012-5600", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "881742" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] A denial of service flaw was found in the way RTCP dissector of Wireshark, a network traffic analyzer, performed dissection of certain RTCP packet capture files. A remote attacker could provide a specially-crafted RTCP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)", "title": "Vulnerability summary" }, { "category": "other", "text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6062. Note: All CVE users should reference CVE-2012-6062 instead of this candidate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5600" }, { "category": "external", "summary": "RHBZ#881742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5600", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5600" } ], "release_date": "2012-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)" }, { "cve": "CVE-2012-6056", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "881809" } ], "notes": [ { "category": "description", "text": "Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Duplicate TSN count.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6056" }, { "category": "external", "summary": "RHBZ#881809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6056", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6056" } ], "release_date": "2012-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)" }, { "cve": "CVE-2012-6060", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "881771" } ], "notes": [ { "category": "description", "text": "Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6060" }, { "category": "external", "summary": "RHBZ#881771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6060", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6060" } ], "release_date": "2012-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)" }, { "cve": "CVE-2012-6061", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "881748" } ], "notes": [ { "category": "description", "text": "The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6061" }, { "category": "external", "summary": "RHBZ#881748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6061", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6061" } ], "release_date": "2012-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)" }, { "cve": "CVE-2012-6062", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "881742" } ], "notes": [ { "category": "description", "text": "The dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6062" }, { "category": "external", "summary": "RHBZ#881742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6062", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6062" } ], "release_date": "2012-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)" }, { "cve": "CVE-2013-3557", "discovery_date": "2013-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "965193" } ], "notes": [ { "category": "description", "text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-3557" }, { "category": "external", "summary": "RHBZ#965193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3557" } ], "release_date": "2013-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)" }, { "cve": "CVE-2013-3559", "discovery_date": "2013-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "965190" } ], "notes": [ { "category": "description", "text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-3559" }, { "category": "external", "summary": "RHBZ#965190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-3559", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3559" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3559", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3559" } ], "release_date": "2013-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)" }, { "cve": "CVE-2013-4081", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2013-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "972686" } ], "notes": [ { "category": "description", "text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4081" }, { "category": "external", "summary": "RHBZ#972686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4081", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4081" }, { "category": "external", "summary": "http://www.wireshark.org/security/wnpa-sec-2013-39.html", "url": "http://www.wireshark.org/security/wnpa-sec-2013-39.html" } ], "release_date": "2013-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)" }, { "cve": "CVE-2013-4083", "discovery_date": "2013-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "972688" } ], "notes": [ { "category": "description", "text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4083" }, { "category": "external", "summary": "RHBZ#972688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4083" }, { "category": "external", "summary": "http://www.wireshark.org/security/wnpa-sec-2013-41.html", "url": "http://www.wireshark.org/security/wnpa-sec-2013-41.html" } ], "release_date": "2013-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)" }, { "cve": "CVE-2013-4927", "discovery_date": "2013-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "990166" } ], "notes": [ { "category": "description", "text": "Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4927" }, { "category": "external", "summary": "RHBZ#990166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4927", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4927" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4927", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4927" } ], "release_date": "2013-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)" }, { "cve": "CVE-2013-4931", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2013-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "990170" } ], "notes": [ { "category": "description", "text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4931" }, { "category": "external", "summary": "RHBZ#990170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4931", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4931" } ], "release_date": "2013-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)" }, { "cve": "CVE-2013-4932", "discovery_date": "2013-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "990172" } ], "notes": [ { "category": "description", "text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4932" }, { "category": "external", "summary": "RHBZ#990172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990172" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4932", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4932" } ], "release_date": "2013-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)" }, { "cve": "CVE-2013-4933", "discovery_date": "2013-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "990175" } ], "notes": [ { "category": "description", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4933" }, { "category": "external", "summary": "RHBZ#990175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990175" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4933", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4933" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4933", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4933" } ], "release_date": "2013-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)" }, { "cve": "CVE-2013-4934", "discovery_date": "2013-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "990178" } ], "notes": [ { "category": "description", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4934" }, { "category": "external", "summary": "RHBZ#990178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990178" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4934", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4934" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4934", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4934" } ], "release_date": "2013-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)" }, { "cve": "CVE-2013-4935", "discovery_date": "2013-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "990179" } ], "notes": [ { "category": "description", "text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4935" }, { "category": "external", "summary": "RHBZ#990179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4935", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4935" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4935", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4935" } ], "release_date": "2013-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)" }, { "cve": "CVE-2013-5721", "discovery_date": "2013-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1007197" } ], "notes": [ { "category": "description", "text": "The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-5721" }, { "category": "external", "summary": "RHBZ#1007197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5721", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5721" } ], "release_date": "2013-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)" }, { "cve": "CVE-2013-7112", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2013-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1044508" } ], "notes": [ { "category": "description", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-7112" }, { "category": "external", "summary": "RHBZ#1044508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-7112", "url": "https://www.cve.org/CVERecord?id=CVE-2013-7112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-7112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7112" }, { "category": "external", "summary": "http://www.wireshark.org/security/wnpa-sec-2013-66.html", "url": "http://www.wireshark.org/security/wnpa-sec-2013-66.html" } ], "release_date": "2013-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)" }, { "cve": "CVE-2014-2281", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-03-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1074114" } ], "notes": [ { "category": "description", "text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: NFS dissector crash (wnpa-sec-2014-01)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-2281" }, { "category": "external", "summary": "RHBZ#1074114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074114" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-2281", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-2281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2281" }, { "category": "external", "summary": "http://www.wireshark.org/security/wnpa-sec-2014-01.html", "url": "http://www.wireshark.org/security/wnpa-sec-2014-01.html" } ], "release_date": "2014-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: NFS dissector crash (wnpa-sec-2014-01)" }, { "cve": "CVE-2014-2299", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-03-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1074109" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-2299" }, { "category": "external", "summary": "RHBZ#1074109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074109" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-2299", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2299" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-2299", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2299" }, { "category": "external", "summary": "http://www.wireshark.org/security/wnpa-sec-2014-04.html", "url": "http://www.wireshark.org/security/wnpa-sec-2014-04.html" } ], "release_date": "2014-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-03-31T16:31:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src", "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x", "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.