First published: Mon Jun 20 2011(Updated: )
An infinite loop was found in the way ANSI A Interface (IS-634/IOS) dissector of the Wireshark network traffic analyzer processed certain ANSI A MAP capture files. If Wireshark read a malformed packet off a network or opened a malicious packet capture file, it could lead to denial of service (Wireshark hang). Upstream bug: [1] <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6044">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6044</a> Public PoC: [2] <a href="http://www.wireshark.org/download/automated/captures/fuzz-2011-06-20-22762.pcap">http://www.wireshark.org/download/automated/captures/fuzz-2011-06-20-22762.pcap</a> Relevant upstream patch: [3] <a href="http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930">http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930</a> References: [4] <a href="http://www.wireshark.org/security/">http://www.wireshark.org/security/</a> [5] <a href="http://www.wireshark.org/security/wnpa-sec-2011-11.html">http://www.wireshark.org/security/wnpa-sec-2011-11.html</a> [6] <a href="http://www.wireshark.org/security/wnpa-sec-2011-10.html">http://www.wireshark.org/security/wnpa-sec-2011-10.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.6.0 | |
Wireshark Wireshark | =1.4.7 | |
Wireshark Wireshark | =1.4.2 | |
Wireshark Wireshark | =1.4.0 | |
Wireshark Wireshark | =1.4.5 | |
Wireshark Wireshark | =1.4.4 | |
Wireshark Wireshark | =1.4.6 | |
Wireshark Wireshark | =1.4.3 | |
Wireshark Wireshark | =1.4.1 | |
redhat/wireshark | <0:1.0.15-5.el5 | 0:1.0.15-5.el5 |
redhat/wireshark | <0:1.2.15-2.el6_2.1 | 0:1.2.15-2.el6_2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.