suse-su-2015:0307-1
Vulnerability from csaf_suse
Published
2015-01-22 08:55
Modified
2015-01-22 08:55
Summary
Security update for wireshark
Notes
Title of the patch
Security update for wireshark
Description of the patch
This update fixes the following security issues:
- The following vulnerabilities allowed Wireshark to be crashed by
injecting a malformed packet onto the wire or by convincing someone
to read a malformed packet trace file.
+ The WCCP dissector could crash
wnpa-sec-2015-01 CVE-2015-0559 CVE-2015-0560 [boo#912365]
+ The LPP dissector could crash.
wnpa-sec-2015-02 CVE-2015-0561 [boo#912368]
+ The DEC DNA Routing Protocol dissector could crash.
wnpa-sec-2015-03 CVE-2015-0562 [boo#912369]
+ The SMTP dissector could crash.
wnpa-sec-2015-04 CVE-2015-0563 [boo#912370]
+ Wireshark could crash while decypting TLS/SSL sessions.
wnpa-sec-2015-05 CVE-2015-0564 [boo#912372]
Patchnames
SUSE-SLE-DESKTOP-12-2015-81,SUSE-SLE-SDK-12-2015-81,SUSE-SLE-SERVER-12-2015-81
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for wireshark",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n This update fixes the following security issues:\n\n- The following vulnerabilities allowed Wireshark to be crashed by\n injecting a malformed packet onto the wire or by convincing someone\n to read a malformed packet trace file.\n + The WCCP dissector could crash\n wnpa-sec-2015-01 CVE-2015-0559 CVE-2015-0560 [boo#912365]\n + The LPP dissector could crash.\n wnpa-sec-2015-02 CVE-2015-0561 [boo#912368]\n + The DEC DNA Routing Protocol dissector could crash.\n wnpa-sec-2015-03 CVE-2015-0562 [boo#912369]\n + The SMTP dissector could crash. \n wnpa-sec-2015-04 CVE-2015-0563 [boo#912370]\n + Wireshark could crash while decypting TLS/SSL sessions.\n wnpa-sec-2015-05 CVE-2015-0564 [boo#912372]\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-2015-81,SUSE-SLE-SDK-12-2015-81,SUSE-SLE-SERVER-12-2015-81",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0307-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2015:0307-1",
"url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150307-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2015:0307-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html"
},
{
"category": "self",
"summary": "SUSE Bug 912365",
"url": "https://bugzilla.suse.com/912365"
},
{
"category": "self",
"summary": "SUSE Bug 912368",
"url": "https://bugzilla.suse.com/912368"
},
{
"category": "self",
"summary": "SUSE Bug 912369",
"url": "https://bugzilla.suse.com/912369"
},
{
"category": "self",
"summary": "SUSE Bug 912370",
"url": "https://bugzilla.suse.com/912370"
},
{
"category": "self",
"summary": "SUSE Bug 912372",
"url": "https://bugzilla.suse.com/912372"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0559 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0560 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0560/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0561 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0561/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0562 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0562/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0563 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0564 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0564/"
}
],
"title": "Security update for wireshark",
"tracking": {
"current_release_date": "2015-01-22T08:55:12Z",
"generator": {
"date": "2015-01-22T08:55:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2015:0307-1",
"initial_release_date": "2015-01-22T08:55:12Z",
"revision_history": [
{
"date": "2015-01-22T08:55:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "wireshark-devel-1.10.12-4.1.ppc64le",
"product": {
"name": "wireshark-devel-1.10.12-4.1.ppc64le",
"product_id": "wireshark-devel-1.10.12-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wireshark-1.10.12-4.1.ppc64le",
"product": {
"name": "wireshark-1.10.12-4.1.ppc64le",
"product_id": "wireshark-1.10.12-4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-devel-1.10.12-4.1.s390x",
"product": {
"name": "wireshark-devel-1.10.12-4.1.s390x",
"product_id": "wireshark-devel-1.10.12-4.1.s390x"
}
},
{
"category": "product_version",
"name": "wireshark-1.10.12-4.1.s390x",
"product": {
"name": "wireshark-1.10.12-4.1.s390x",
"product_id": "wireshark-1.10.12-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-1.10.12-4.1.x86_64",
"product": {
"name": "wireshark-1.10.12-4.1.x86_64",
"product_id": "wireshark-1.10.12-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-devel-1.10.12-4.1.x86_64",
"product": {
"name": "wireshark-devel-1.10.12-4.1.x86_64",
"product_id": "wireshark-devel-1.10.12-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12",
"product": {
"name": "SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12",
"product": {
"name": "SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.12-4.1.x86_64 as component of SUSE Linux Enterprise Desktop 12",
"product_id": "SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64"
},
"product_reference": "wireshark-1.10.12-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-1.10.12-4.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le"
},
"product_reference": "wireshark-devel-1.10.12-4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-1.10.12-4.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x"
},
"product_reference": "wireshark-devel-1.10.12-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-1.10.12-4.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12",
"product_id": "SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
},
"product_reference": "wireshark-devel-1.10.12-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.12-4.1.ppc64le as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le"
},
"product_reference": "wireshark-1.10.12-4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.12-4.1.s390x as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x"
},
"product_reference": "wireshark-1.10.12-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.12-4.1.x86_64 as component of SUSE Linux Enterprise Server 12",
"product_id": "SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64"
},
"product_reference": "wireshark-1.10.12-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.12-4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le"
},
"product_reference": "wireshark-1.10.12-4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.12-4.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x"
},
"product_reference": "wireshark-1.10.12-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.12-4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64"
},
"product_reference": "wireshark-1.10.12-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-0559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0559"
}
],
"notes": [
{
"category": "general",
"text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0559",
"url": "https://www.suse.com/security/cve/CVE-2015-0559"
},
{
"category": "external",
"summary": "SUSE Bug 912365 for CVE-2015-0559",
"url": "https://bugzilla.suse.com/912365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-01-22T08:55:12Z",
"details": "moderate"
}
],
"title": "CVE-2015-0559"
},
{
"cve": "CVE-2015-0560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0560"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0560",
"url": "https://www.suse.com/security/cve/CVE-2015-0560"
},
{
"category": "external",
"summary": "SUSE Bug 912365 for CVE-2015-0560",
"url": "https://bugzilla.suse.com/912365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-01-22T08:55:12Z",
"details": "moderate"
}
],
"title": "CVE-2015-0560"
},
{
"cve": "CVE-2015-0561",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0561"
}
],
"notes": [
{
"category": "general",
"text": "asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0561",
"url": "https://www.suse.com/security/cve/CVE-2015-0561"
},
{
"category": "external",
"summary": "SUSE Bug 912368 for CVE-2015-0561",
"url": "https://bugzilla.suse.com/912368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-01-22T08:55:12Z",
"details": "moderate"
}
],
"title": "CVE-2015-0561"
},
{
"cve": "CVE-2015-0562",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0562"
}
],
"notes": [
{
"category": "general",
"text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0562",
"url": "https://www.suse.com/security/cve/CVE-2015-0562"
},
{
"category": "external",
"summary": "SUSE Bug 912369 for CVE-2015-0562",
"url": "https://bugzilla.suse.com/912369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-01-22T08:55:12Z",
"details": "moderate"
}
],
"title": "CVE-2015-0562"
},
{
"cve": "CVE-2015-0563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0563"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0563",
"url": "https://www.suse.com/security/cve/CVE-2015-0563"
},
{
"category": "external",
"summary": "SUSE Bug 912370 for CVE-2015-0563",
"url": "https://bugzilla.suse.com/912370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-01-22T08:55:12Z",
"details": "moderate"
}
],
"title": "CVE-2015-0563"
},
{
"cve": "CVE-2015-0564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0564"
}
],
"notes": [
{
"category": "general",
"text": "Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0564",
"url": "https://www.suse.com/security/cve/CVE-2015-0564"
},
{
"category": "external",
"summary": "SUSE Bug 912372 for CVE-2015-0564",
"url": "https://bugzilla.suse.com/912372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12:wireshark-1.10.12-4.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12:wireshark-devel-1.10.12-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2015-01-22T08:55:12Z",
"details": "moderate"
}
],
"title": "CVE-2015-0564"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…