lp://staging/ubuntu/gutsy-security/wireshark
- Get this branch:
- bzr branch lp://staging/ubuntu/gutsy-security/wireshark
Branch merges
Branch information
Recent revisions
- 18. By Stefan Lesicnik
-
* SECURITY UPDATE: The dissect_btacl function in packet-bthci_acl.c in the
Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote
attackers to cause a denial of service (application crash or abort) via
a packet with an invalid length, related to an erroneous tvb_memcpy call.
(LP #290716)
- debian/patches/ 33_CVE- 2008-4683. dpatch - buffer check to prevent
overflow - Jeff Morris.
- Cherrypicked from http://anonsvn. wireshark. org/wireshark/ trunk
- Revision: 25195
- Included patch not listed by CVE to prevent memory overflow in
bluetooth dissector - Jeff Morris.
- Cherrypicked from http://anonsvn. wireshark. org/wireshark/ trunk
- Revision: 25196
- CVE-2008-4683
* SECURITY UPDATE: packet-frame in Wireshark 0.99.2 through 1.0.3 does not
properly handle exceptions thrown by post dissectors, which allows
remote attackers to cause a denial of service (application crash) via
a certain series of packets, as demonstrated by enabling the (1) PRP
or (2) MATE post dissector. (LP #290716)
- debian/patches/ 34_CVE- 2008-4684. dpatch - Catch errors given
post dissectors - Jeff Morris, wmeier
- Cherrypicked from http://anonsvn. wireshark. org/wireshark/ trunk
- Revision: 25339, 25342, 25344
- CVE-2008-4684
* SECURITY UPDATE: Use-after-free vulnerability in the dissect_q931_cause_ ie
function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3
through 1.0.3 allows remote attackers to cause a denial of service (application
crash or abort) via certain packets that trigger an exception. (LP #290716)
- debian/patches/ 35_CVE- 2008-4685. dpatch - Wrap dissect_ q931_cause_ ie() in
which clears the have_valid_q931_pi semaphore - Jaap Keuter.
- Cherrypicked from http://anonsvn. wireshark. org/wireshark/ trunk
- Included as was detected as vulnerable even although CVE says otherwise.
- Revision: 26190
- CVE-2008-4685 - 17. By Emanuele Gentili
-
* SECURITY UPDATE: (LP: #172283)
+ CVE-2007-6438
- Vulnerability in the SMB dissector in Wireshark 0.99.6 allows remote
attackers to cause a denial of service via unknown vectors.
+ CVE-2007-6539
- Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause
a denial of service (infinite or large loop) via the (1) IPv6 or (2)
USB dissector, which can trigger resource consumption or a crash.
+ CVE-2007-6441
- The WiMAX dissector in Wireshark (formerly Ethereal) 0.99.6 allows
remote attackers to cause a denial of service (crash) via unknown
vectors related to "unaligned access on some platforms."
+ CVE-2007-6450
- The RPL dissector in Wireshark (formerly Ethereal) 0.9.8 to 0.99.6
allows remote attackers to cause a denial of service (infinite loop)
via unknown vectors.
+ CVE-2007-6451
- vulnerability in the CIP dissector in Wireshark (formerly Ethereal)
0.9.14 to 0.99.6 allows remote attackers to cause a denial of service
(crash) via unknown vectors that trigger allocation of large amounts
of memory.
+ CVE-2008-1070
- The SCTP dissector in Wireshark (formerly Ethereal) 0.99.5 through
0.99.7 allows remote attackers to cause a denial of service (crash)
via a malformed packet.
+ CVE-2008-1071
- The SNMP dissector in Wireshark (formerly Ethereal) 0.99.6 through
0.99.7 allows remote attackers to cause a denial of service (crash)
via a malformed packet. (not vulnerable in Gutsy)
+ CVE-2008-1072
- The TFTP dissector in Wireshark (formerly Ethereal) 0.6.0 through
0.99.7, when running on Ubuntu 7.10, allows remote attackers to caus
e a denial of service (crash or memory consumption) via a malformed
packet, possibly related to a Cairo library bug.+ debian/
patches/ 13_CVE- 2007-6438. dpatch
- Applied patch by upstream
- http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk/ epan/
dissectors/packet- smb.c?r1= 23412&r2= 23593&pathrev= 23593
+ debian/patches/ 13_CVE- 2007-6439. dpatch
- Applied patch by upstream
- http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk/ epan/
dissectors/packet- ipv6.c? r1=23412& r2=23593& pathrev= 23593
- http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk/ epan/
dissectors/packet- usb.c?r1= 23412&r2= 23593&pathrev= 23593
+ debian/patches/ 13_CVE- 2007-6441. dpatch
- Applied patch by upstream
- http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk/ plugins/
wimax/wimax_bits. h?r1=23412& r2=23787& pathrev= 23555
+ debian/patches/ 13_CVE- 2007-6450. dpatch
- Applied patch by upstream
- http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk/ epan/
dissectors/packet- rpl.c?r1= 23412&r2= 23687&pathrev= 23687
+ debian/patches/ 13_CVE- 2007-6451. dpatch
- Applied patch by upstream
- http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk/ epan/
dissectors/packet- cip.c?r1= 23412&r2= 12070&pathrev= 12070
+ debian/patches/ 14_CVE- 2008-1070. dpatch
- Applied patch by upastream
- http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk/ epan/
dissectors/packet- sctp.c? r1=24295& r2=24471& pathrev= 24563
+ debian/patches/ 14_CVE- 2008-1072. dpatch
- Applied patch by upstream
- http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk/ epan/
dissectors/packet- tftp.c? r1=23412& r2=23962& pathrev= 23962 * References
+ http://www.wireshark. org/security/ wnpa-sec- 2007-03. html
- CVE-2007-6438
- CVE-2007-6439
- CVE-2007-6441
- CVE-2007-6450
- CVE-2007-6451
+ http://www.wireshark. org/security/ wnpa-sec- 2008-01. html
- CVE-2008-1070
- CVE-2008-1071 (not vulnerable in gutsy and not patched.)
- CVE-2008-1072 - 16. By Stephan RĂ¼gamer
-
* SECURITY UPDATE: (LP: #164501)
+ CVE-2007-6121: Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows
remote attackers to cause a denial of service (crash) via a malformed RPC
Portmap packet.
+ CVE-2007-6120: The Bluetooth SDP dissector Wireshark (formerly Ethereal)
0.99.2 to 0.99.6 allows remote attackers to cause a denial of service
(infinite loop) via unknown vectors.
+ CVE-2007-6117: Unspecified vulnerability in the HTTP dissector for
Wireshark (formerly Ethereal) 0.10.14 to 0.99.6 has unknown impact and remote
attack vectors related to chunked messages.
+ CVE-2007-6114: Multiple buffer overflows in Wireshark (formerly
Ethereal) 0.99.0 through 0.99.6 allow remote attackers to cause a denial of
service (crash) and possibly execute arbitrary code via (1) the SSL dissector
or (2) the iSeries (OS/400) Communication trace file parser.
+ CVE-2007-6113: Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows
remote attackers to cause a denial of service (long loop) via a malformed DNP
packet.
+ CVE-2007-6119: The DCP ETSI dissector in Wireshark (formerly Ethereal) 0.99.6
allows remote attackers to cause a denial of service (long loop and
resource consumption) via unknown vectors.
+ CVE-2007-6118: The MEGACO dissector in Wireshark (formerly Ethereal) 0.9.14 to
0.99.6 allows remote attackers to cause a denial of service (long loop and
resource consumption) via unknown vectors.
+ CVE-2007-6116: The Firebird/Interbase dissector in Wireshark (formerly Ethereal)
0.99.6 allows remote attackers to cause a denial of service (infinite loop
or crash) via unknown vectors.
+ CVE-2007-6115: Buffer overflow in the ANSI MAP dissector for Wireshark (formerly Ethereal)
0.99.5 to 0.99.6, when running on unspecified platforms, allows remote attackers to cause
a denial of service and possibly execute arbitrary code via unknown vectors.
+ CVE-2007-6112: Buffer overflow in the PPP dissector Wireshark (formerly Ethereal) 0.99.6
allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary
code via unknown vectors.
+ CVE-2007-6111: Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow
remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or
(2) unspecified vectors to the NCP dissector.
* debian/patches/ 13_CVE- 2007-6121. dpatch:
- Applied patch by upstream
- Link: http://bugs.wireshark. org/bugzilla/ attachment. cgi?id= 1132
* debian/patches/ 13_CVE- 2007-6120. dpatch:
- Applied patch by upstream
- Link: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- btsdp.c? r1=21431& r2=23496& view=patch
* debian/patches/ 13_CVE- 2007-6117. dpatch:
- Applied patch by upstream
- Link: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- http.c? r1=22515& r2=23415& view=patch
* debian/patches/ 13_CVE- 2007-6114. dpatch:
- Applied patch by upstream
- Link 1: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- ssl-utils. h?r1=21445& r2=22883& view=patch
- Link 2: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- ssl.c?r1= 22625&r2= 22883&view= patch
- Link 3: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ wiretap/ iseries. c?r1=23000& r2=23232& view=patch
* debian/patches/ 13_CVE- 2007-6113. dpatch:
- Applied patch by upstream
- Link: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- dnp.c?r1= 22764&r2= 22811&view= patch
* debian/patches/ 13_CVE- 2007-6119. dpatch:
- Applied patch by upstream
- Link: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- dcp-etsi. c?r1=22542& r2=23463& view=patch
* debian/patches/ 13_CVE- 2007-6118. dpatch:
- Applied patch by upstream
- Link: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- megaco. c?r1=23150& r2=23449& view=patch
* debian/patches/ 13_CVE- 2007-6116. dpatch:
- Applied patch by upstream
- Link: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- gdsdb.c? r1=23211& r2=23251& view=patch
* debian/patches/ 13_CVE- 2007-6115. dpatch:
- Applied patch by upstream
- Link: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- ansi_map. c?r1=22866& r2=22892& view=patch
* debian/patches/ 13_CVE- 2007-6112. dpatch:
- Applied patch by upstream
- Link: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- ppp.c?r1= 23252&r2= 23475&view= patch
* debian/patches/ 13_CVE- 2007-6111. dpatch:
- Applied patch by upstream
- Link 1: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ wiretap/ mpeg.c? r1=21489& r2=22261
- Link 2: http://anonsvn. wireshark. org/viewvc/ viewvc. py/trunk- 0.99.7/ epan/dissectors /packet- ncp.c?r1= 21167&r2= 23252&view= patch
* debian/control:
- Updated Maintainer field following Ubuntu Maintainer Policy
* References:
CVE-2007-6121
CVE-2007-6120
CVE-2007-6117
CVE-2007-6114
CVE-2007-6113
CVE-2007-6119
CVE-2007-6118
CVE-2007-6116
CVE-2007-6115
CVE-2007-6112
CVE-2007-6111
http://www.wireshark. org/security/ wnpa-sec- 2007-03. html - 15. By Frederic Peters <email address hidden>
-
debian/rules: added check for wireshark-dev headers (closes: #436247 )
- 14. By Frederic Peters <email address hidden>
-
* New upstream pre-release, with security fixes:
* could crash when dissecting an HTTP chunked response
* could crash while reading iSeries capture files
* could exhaust system memory while reading a malformed DCP ETSI packet
* could loop excessively while reading a malformed SSL packet
* DHCP/BOOTP dissector was susceptible to an off-by-one error
* could loop excessively while reading a malformed MMS packet
* debian/control: added libkrb5-dev to build-deps so Kerberos support is
built.
* debian/control: replaced {Source-Version} with appropriate {binary:Version}
* debian/wireshark- dev.header- files: use wildcards to get all headers
(closes: #423000)
* debian/patches/ 14_disable- cmip.dpatch: disable CMIP dissector which
doesn't build at the moment.
* debian/rules: don't ignore all errors on make distclean - 13. By Frederic Peters <email address hidden>
-
* New upstream release.
* debian/patches/ 09_idl2wrs. dpatch: updated to patch idl2wrs.sh.in. - 12. By Frederic Peters <email address hidden>
-
debian/
patches/ 10_wireshark_ gen.dpatch: removed as it is no longer
necessary. (closes: #412963) - 11. By Frederic Peters <email address hidden>
-
debian/
patches/ 00list: really include backported security fixes, stupid me. - 10. By Frederic Peters <email address hidden>
-
* Backported security fixes from 0.99.5pre1
* The TCP dissector could hang or crash while reassembling HTTP packets.
* The HTTP dissector could crash.
* On some systems, the IEEE 802.11 dissector could crash.
* On some systems, the LLT dissector could crash.
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp://staging/ubuntu/karmic/wireshark