Security update for wireshark

SUSE Security Update: Security update for wireshark
Announcement ID: SUSE-SU-2013:1265-1
Rating: moderate
References: #813217 #816517 #816887 #820973 #824900
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP3
  • SUSE Linux Enterprise Software Development Kit 11 SP2
  • SUSE Linux Enterprise Server 11 SP3 for VMware
  • SUSE Linux Enterprise Server 11 SP3
  • SUSE Linux Enterprise Server 11 SP2 for VMware
  • SUSE Linux Enterprise Server 11 SP2
  • SUSE Linux Enterprise Desktop 11 SP3
  • SUSE Linux Enterprise Desktop 11 SP2

  • An update that fixes 20 vulnerabilities is now available. It includes one version update.

    Description:


    This wireshark version update to 1.8.8 includes several
    security and general bug fixes.

    Version update to 1.8.8 [bnc#824900]:

    * vulnerabilities fixed: o The CAPWAP dissector could
    crash. wnpa-sec-2013-32 CVE-2013-4074 o The GMR-1 BCCH
    dissector could crash. wnpa-sec-2013-33 CVE-2013-4075 o The
    PPP dissector could crash. wnpa-sec-2013-34 CVE-2013-4076 o
    The NBAP dissector could crash. wnpa-sec-2013-35
    CVE-2013-4077 o The RDP dissector could crash.
    wnpa-sec-2013-36 CVE-2013-4078 o The GSM CBCH dissector
    could crash. wnpa-sec-2013-37 CVE-2013-4079 o The Assa
    Abloy R3 dissector could consume excessive memory and CPU.
    wnpa-sec-2013-38 CVE-2013-4080 o The HTTP dissector could
    overrun the stack. wnpa-sec-2013-39 CVE-2013-4081 o The
    Ixia IxVeriWave file parser could overflow the heap.
    wnpa-sec-2013-40 CVE-2013-4082 o The DCP ETSI dissector
    could crash. wnpa-sec-2013-41 CVE-2013-4083
    * Further bug fixes and updated protocol support as
    listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html
    l>

    Version update to 1.8.7 [bnc#813217, bnc#820973]:

    * vulnerabilities fixed: o The RELOAD dissector could
    go into an infinite loop. wnpa-sec-2013-23 CVE-2013-2486
    CVE-2013-2487 o The GTPv2 dissector could crash.
    wnpa-sec-2013-24 o The ASN.1 BER dissector could crash.
    wnpa-sec-2013-25 o The PPP CCP dissector could crash.
    wnpa-sec-2013-26 o The DCP ETSI dissector could crash.
    wnpa-sec-2013-27 o The MPEG DSM-CC dissector could crash.
    wnpa-sec-2013-28 o The Websocket dissector could crash.
    wnpa-sec-2013-29 o The MySQL dissector could go into an
    infinite loop. wnpa-sec-2013-30 o The ETCH dissector could
    go into a large loop. wnpa-sec-2013-31
    * Further bug fixes and updated protocol support as
    listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.8.7.html
    l>

    Ohter bug fixes:

    * bnc#816517: 'Save As' Nokia libpcap corrupting the
    file
    * bnc#816887: wireshark crashed in 'SCTP' -> 'Prepare
    Filter for this Association'

    Security Issue references:

    * CVE-2013-2486
    >
    * CVE-2013-2487
    >
    * CVE-2013-3555
    >
    * CVE-2013-3556
    >
    * CVE-2013-3557
    >
    * CVE-2013-3558
    >
    * CVE-2013-3559
    >
    * CVE-2013-3560
    >
    * CVE-2013-3561
    >
    * CVE-2013-3562
    >
    * CVE-2013-3561
    >
    * CVE-2013-3561
    >
    * CVE-2013-4074
    >
    * CVE-2013-4075
    >
    * CVE-2013-4076
    >
    * CVE-2013-4077
    >
    * CVE-2013-4078
    >
    * CVE-2013-4079
    >
    * CVE-2013-4080
    >
    * CVE-2013-4081
    >
    * CVE-2013-4082
    >
    * CVE-2013-4083
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP3:
      zypper in -t patch sdksp3-wireshark-8045
    • SUSE Linux Enterprise Software Development Kit 11 SP2:
      zypper in -t patch sdksp2-wireshark-8044
    • SUSE Linux Enterprise Server 11 SP3 for VMware:
      zypper in -t patch slessp3-wireshark-8045
    • SUSE Linux Enterprise Server 11 SP3:
      zypper in -t patch slessp3-wireshark-8045
    • SUSE Linux Enterprise Server 11 SP2 for VMware:
      zypper in -t patch slessp2-wireshark-8044
    • SUSE Linux Enterprise Server 11 SP2:
      zypper in -t patch slessp2-wireshark-8044
    • SUSE Linux Enterprise Desktop 11 SP3:
      zypper in -t patch sledsp3-wireshark-8045
    • SUSE Linux Enterprise Desktop 11 SP2:
      zypper in -t patch sledsp2-wireshark-8044

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.8.8]:
    • wireshark-devel-1.8.8-0.2.1
    • SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64) [New Version: 1.8.8]:
    • wireshark-1.8.8-0.2.1
    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.8.8]:
    • wireshark-devel-1.8.8-0.2.1
    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64) [New Version: 1.8.8]:
    • wireshark-1.8.8-0.2.1
    • SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 1.8.8]:
    • wireshark-1.8.8-0.2.1
    • SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.8.8]:
    • wireshark-1.8.8-0.2.1
    • SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 1.8.8]:
    • wireshark-1.8.8-0.2.1
    • SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.8.8]:
    • wireshark-1.8.8-0.2.1
    • SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 1.8.8]:
    • wireshark-1.8.8-0.2.1
    • SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 1.8.8]:
    • wireshark-1.8.8-0.2.1

    References:

    • http://support.novell.com/security/cve/CVE-2013-2486.html
    • http://support.novell.com/security/cve/CVE-2013-2487.html
    • http://support.novell.com/security/cve/CVE-2013-3555.html
    • http://support.novell.com/security/cve/CVE-2013-3556.html
    • http://support.novell.com/security/cve/CVE-2013-3557.html
    • http://support.novell.com/security/cve/CVE-2013-3558.html
    • http://support.novell.com/security/cve/CVE-2013-3559.html
    • http://support.novell.com/security/cve/CVE-2013-3560.html
    • http://support.novell.com/security/cve/CVE-2013-3561.html
    • http://support.novell.com/security/cve/CVE-2013-3562.html
    • http://support.novell.com/security/cve/CVE-2013-4074.html
    • http://support.novell.com/security/cve/CVE-2013-4075.html
    • http://support.novell.com/security/cve/CVE-2013-4076.html
    • http://support.novell.com/security/cve/CVE-2013-4077.html
    • http://support.novell.com/security/cve/CVE-2013-4078.html
    • http://support.novell.com/security/cve/CVE-2013-4079.html
    • http://support.novell.com/security/cve/CVE-2013-4080.html
    • http://support.novell.com/security/cve/CVE-2013-4081.html
    • http://support.novell.com/security/cve/CVE-2013-4082.html
    • http://support.novell.com/security/cve/CVE-2013-4083.html
    • https://bugzilla.novell.com/813217
    • https://bugzilla.novell.com/816517
    • https://bugzilla.novell.com/816887
    • https://bugzilla.novell.com/820973
    • https://bugzilla.novell.com/824900
    • http://download.suse.com/patch/finder/?keywords=01bde4a9b83d054d421819162ba7b352
    • http://download.suse.com/patch/finder/?keywords=9e62de2dfb272343bbe45e5f61e345fa