rhsa-2014_0341
Vulnerability from csaf_redhat
Published
2014-03-31 16:31
Modified
2024-12-02 06:56
Summary
Red Hat Security Advisory: wireshark security update
Notes
Topic
Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Wireshark is a network protocol analyzer. It is used to capture and browse
the traffic running on a computer network.
Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash or,
possibly, execute arbitrary code as the user running Wireshark.
(CVE-2013-3559, CVE-2013-4083, CVE-2014-2281, CVE-2014-2299)
Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2012-5595, CVE-2012-5598, CVE-2012-5599,
CVE-2012-5600, CVE-2012-6056, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,
CVE-2013-3557, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931, CVE-2013-4932,
CVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-5721, CVE-2013-7112)
All Wireshark users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. All running instances
of Wireshark must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated wireshark packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Wireshark is a network protocol analyzer. It is used to capture and browse\nthe traffic running on a computer network.\n\nMultiple flaws were found in Wireshark. If Wireshark read a malformed\npacket off a network or opened a malicious dump file, it could crash or,\npossibly, execute arbitrary code as the user running Wireshark.\n(CVE-2013-3559, CVE-2013-4083, CVE-2014-2281, CVE-2014-2299)\n\nSeveral denial of service flaws were found in Wireshark. Wireshark could\ncrash or stop responding if it read a malformed packet off a network, or\nopened a malicious dump file. (CVE-2012-5595, CVE-2012-5598, CVE-2012-5599,\nCVE-2012-5600, CVE-2012-6056, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,\nCVE-2013-3557, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931, CVE-2013-4932,\nCVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-5721, CVE-2013-7112)\n\nAll Wireshark users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. All running instances\nof Wireshark must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:0341",
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "881742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742"
},
{
"category": "external",
"summary": "881748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748"
},
{
"category": "external",
"summary": "881771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771"
},
{
"category": "external",
"summary": "881809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809"
},
{
"category": "external",
"summary": "965190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=965190"
},
{
"category": "external",
"summary": "965193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=965193"
},
{
"category": "external",
"summary": "972686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=972686"
},
{
"category": "external",
"summary": "972688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=972688"
},
{
"category": "external",
"summary": "990166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990166"
},
{
"category": "external",
"summary": "990170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990170"
},
{
"category": "external",
"summary": "990172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990172"
},
{
"category": "external",
"summary": "990175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990175"
},
{
"category": "external",
"summary": "990178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990178"
},
{
"category": "external",
"summary": "990179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990179"
},
{
"category": "external",
"summary": "1007197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197"
},
{
"category": "external",
"summary": "1044508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044508"
},
{
"category": "external",
"summary": "1074109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074109"
},
{
"category": "external",
"summary": "1074114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074114"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0341.json"
}
],
"title": "Red Hat Security Advisory: wireshark security update",
"tracking": {
"current_release_date": "2024-12-02T06:56:26+00:00",
"generator": {
"date": "2024-12-02T06:56:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2014:0341",
"initial_release_date": "2014-03-31T16:31:57+00:00",
"revision_history": [
{
"date": "2014-03-31T16:31:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-03-31T16:31:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-02T06:56:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"product": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"product_id": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"product": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.i386",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.i386",
"product_id": "wireshark-0:1.0.15-6.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"product": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"product_id": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"product": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.x86_64",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.x86_64",
"product_id": "wireshark-0:1.0.15-6.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.src",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.src",
"product_id": "wireshark-0:1.0.15-6.el5_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"product": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"product_id": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.ia64",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.ia64",
"product_id": "wireshark-0:1.0.15-6.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"product": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"product": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"product_id": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.ppc",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.ppc",
"product_id": "wireshark-0:1.0.15-6.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"product": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"product": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"product_id": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.s390x",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.s390x",
"product_id": "wireshark-0:1.0.15-6.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"product": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.src",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.src",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.src",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-5595",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881809"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2012-6056. Note: All CVE users should reference CVE-2012-6056 instead of this candidate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5595"
},
{
"category": "external",
"summary": "RHBZ#881809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5595",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5595"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5595",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5595"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)"
},
{
"cve": "CVE-2012-5598",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881771"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] An integer overflow vulnerability has been identified in the dissect_iscsi_pdu() function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark. A remote attacker could provide a specially-crafted iSCSI packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6060. Note: All CVE users should reference CVE-2012-6060 instead of this candidate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5598"
},
{
"category": "external",
"summary": "RHBZ#881771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5598",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5598"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)"
},
{
"cve": "CVE-2012-5599",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881748"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A denial of service flaw was found in the way WTP dissector of Wireshark, a network traffic analyzer, performed dissection of certain WTP packet capture files. A remote attacker could provide a specially-crafted WTP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6061. Note: All CVE users should reference CVE-2012-6061 instead of this candidate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5599"
},
{
"category": "external",
"summary": "RHBZ#881748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5599",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5599"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5599",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5599"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)"
},
{
"cve": "CVE-2012-5600",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881742"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A denial of service flaw was found in the way RTCP dissector of Wireshark, a network traffic analyzer, performed dissection of certain RTCP packet capture files. A remote attacker could provide a specially-crafted RTCP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6062. Note: All CVE users should reference CVE-2012-6062 instead of this candidate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5600"
},
{
"category": "external",
"summary": "RHBZ#881742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5600"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)"
},
{
"cve": "CVE-2012-6056",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881809"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Duplicate TSN count.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6056"
},
{
"category": "external",
"summary": "RHBZ#881809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6056",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6056"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)"
},
{
"cve": "CVE-2012-6060",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881771"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6060"
},
{
"category": "external",
"summary": "RHBZ#881771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6060",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6060"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6060",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6060"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)"
},
{
"cve": "CVE-2012-6061",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881748"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6061"
},
{
"category": "external",
"summary": "RHBZ#881748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6061",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6061"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6061",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6061"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)"
},
{
"cve": "CVE-2012-6062",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881742"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6062"
},
{
"category": "external",
"summary": "RHBZ#881742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6062",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6062"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6062",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6062"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)"
},
{
"cve": "CVE-2013-3557",
"discovery_date": "2013-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "965193"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-3557"
},
{
"category": "external",
"summary": "RHBZ#965193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=965193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3557"
}
],
"release_date": "2013-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)"
},
{
"cve": "CVE-2013-3559",
"discovery_date": "2013-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "965190"
}
],
"notes": [
{
"category": "description",
"text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-3559"
},
{
"category": "external",
"summary": "RHBZ#965190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=965190"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-3559",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3559"
}
],
"release_date": "2013-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)"
},
{
"cve": "CVE-2013-4081",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2013-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "972686"
}
],
"notes": [
{
"category": "description",
"text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4081"
},
{
"category": "external",
"summary": "RHBZ#972686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=972686"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4081",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4081"
},
{
"category": "external",
"summary": "http://www.wireshark.org/security/wnpa-sec-2013-39.html",
"url": "http://www.wireshark.org/security/wnpa-sec-2013-39.html"
}
],
"release_date": "2013-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)"
},
{
"cve": "CVE-2013-4083",
"discovery_date": "2013-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "972688"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4083"
},
{
"category": "external",
"summary": "RHBZ#972688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=972688"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4083"
},
{
"category": "external",
"summary": "http://www.wireshark.org/security/wnpa-sec-2013-41.html",
"url": "http://www.wireshark.org/security/wnpa-sec-2013-41.html"
}
],
"release_date": "2013-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)"
},
{
"cve": "CVE-2013-4927",
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990166"
}
],
"notes": [
{
"category": "description",
"text": "Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4927"
},
{
"category": "external",
"summary": "RHBZ#990166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4927",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4927"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4927",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4927"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)"
},
{
"cve": "CVE-2013-4931",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990170"
}
],
"notes": [
{
"category": "description",
"text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4931"
},
{
"category": "external",
"summary": "RHBZ#990170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4931",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4931"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4931",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4931"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)"
},
{
"cve": "CVE-2013-4932",
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990172"
}
],
"notes": [
{
"category": "description",
"text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4932"
},
{
"category": "external",
"summary": "RHBZ#990172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990172"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4932"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4932",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4932"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)"
},
{
"cve": "CVE-2013-4933",
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990175"
}
],
"notes": [
{
"category": "description",
"text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4933"
},
{
"category": "external",
"summary": "RHBZ#990175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990175"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4933"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4933",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4933"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)"
},
{
"cve": "CVE-2013-4934",
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990178"
}
],
"notes": [
{
"category": "description",
"text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4934"
},
{
"category": "external",
"summary": "RHBZ#990178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4934"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)"
},
{
"cve": "CVE-2013-4935",
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990179"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4935"
},
{
"category": "external",
"summary": "RHBZ#990179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4935"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)"
},
{
"cve": "CVE-2013-5721",
"discovery_date": "2013-09-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1007197"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-5721"
},
{
"category": "external",
"summary": "RHBZ#1007197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-5721",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5721"
}
],
"release_date": "2013-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)"
},
{
"cve": "CVE-2013-7112",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2013-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1044508"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-7112"
},
{
"category": "external",
"summary": "RHBZ#1044508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044508"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-7112",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7112"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-7112",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7112"
},
{
"category": "external",
"summary": "http://www.wireshark.org/security/wnpa-sec-2013-66.html",
"url": "http://www.wireshark.org/security/wnpa-sec-2013-66.html"
}
],
"release_date": "2013-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)"
},
{
"cve": "CVE-2014-2281",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2014-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1074114"
}
],
"notes": [
{
"category": "description",
"text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: NFS dissector crash (wnpa-sec-2014-01)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-2281"
},
{
"category": "external",
"summary": "RHBZ#1074114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-2281",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2281"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-2281",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2281"
},
{
"category": "external",
"summary": "http://www.wireshark.org/security/wnpa-sec-2014-01.html",
"url": "http://www.wireshark.org/security/wnpa-sec-2014-01.html"
}
],
"release_date": "2014-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wireshark: NFS dissector crash (wnpa-sec-2014-01)"
},
{
"cve": "CVE-2014-2299",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2014-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1074109"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-2299"
},
{
"category": "external",
"summary": "RHBZ#1074109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2299"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-2299",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2299"
},
{
"category": "external",
"summary": "http://www.wireshark.org/security/wnpa-sec-2014-04.html",
"url": "http://www.wireshark.org/security/wnpa-sec-2014-04.html"
}
],
"release_date": "2014-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…