ArchLinux: 201411-24: wireshark-qt: denial of service
Summary
- CVE-2014-8710 (out-of-bounds read)
Out-of-bounds read flaw in the SigComp dissector (sigcomp-udvm) leads to
denial of service while processing malformed packets.
- CVE-2014-8711 (out-of-bounds read)
The AMQP dissector is seeing a large value in the capture file for what
it thinks should be a field specifying the number of elements in an
array, resulting in undetected overflow (wrapping).
- CVE-2014-8712 (stack buffer overflow)
An issue in the NCP dissector while constructing strings may lead to
incorrect data length, resulting in stack buffer overflow and denial of
service.
- CVE-2014-8713 (denial of service)
An issue in the NCP dissector may lead to denial of service while
accessing an uninitialized buffer.
- CVE-2014-8714 (denial of service)
A missing exit when the offset is not incremented in the tn5250
dissector is leading to an endless loop, resulting in denial of service.
Resolution
Upgrade to 1.12.2-1.
# pacman -Syu "wireshark-qt>=1.12.2-1"
The problems have been fixed upstream in version 1.12.2.
References
https://lists.wireshark.org/archives/wireshark-users/201411/msg00004.html https://www.wireshark.org/security/wnpa-sec-2014-20.html https://www.wireshark.org/security/wnpa-sec-2014-21.html https://www.wireshark.org/security/wnpa-sec-2014-22.html https://www.wireshark.org/security/wnpa-sec-2014-23.html https://access.redhat.com/security/cve/CVE-2014-8710 https://access.redhat.com/security/cve/CVE-2014-8711 https://access.redhat.com/security/cve/CVE-2014-8712 https://access.redhat.com/security/cve/CVE-2014-8713 https://access.redhat.com/security/cve/CVE-2014-8714 https://gitlab.com/wireshark/wireshark/-/issues/10662 https://gitlab.com/wireshark/wireshark/-/issues/10582 https://gitlab.com/wireshark/wireshark/-/issues/10552 https://gitlab.com/wireshark/wireshark/-/issues/10628 https://gitlab.com/wireshark/wireshark/-/issues/10596
Workaround
None.