CVE-2010-4300 and CVE-2010-3445
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
wireshark (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | ||
Lucid |
Won't Fix
|
Medium
|
Unassigned | ||
Maverick |
Fix Released
|
Medium
|
Jamie Strandboge |
Bug Description
Binary package hint: wireshark
http://
Description
Wireshark 1.2.12 fixes the following vulnerability:
The Penetration Test Team of NCNIPC (China) discovered that the ASN.1 BER dissector was susceptible to a stack overflow. (Bug 5230) Versions affected: All previous versions up to and including 1.2.11 and 1.4.0. CVE-2010-3445
Impact
It may be possible to make Wireshark crash by injecting a series of malformed packets onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 1.2.12 or later. Due to the nature of these bugs we do not recommend trying to work around the problem by disabling dissectors.
-------
http://
Description
Wireshark 1.2.13 fixes the following vulnerability:
Nephi Johnson of BreakingPoint discovered that the LDSS dissector could overflow a buffer. (Bug 5318) Versions affected: 1.2.0 to 1.2.12 and 1.4.0 to 1.4.1. CVE-2010-4300
Impact
It may be possible to make Wireshark crash by injecting a series of malformed packets onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 1.2.13 or later.
If are running Wireshark 1.2.12 or earlier (including Ethereal) and cannot upgrade, you can work around each of the problems listed above by doing the following:
Disable the LDSS dissector:
Select Analyze→Enabled Protocols... from the menu.
Make sure "LDSS" is un-checked.
Click "Save", then click "OK".
visibility: | private → public |
Changed in wireshark (Ubuntu Maverick): | |
status: | In Progress → Fix Committed |
Changed in wireshark (Ubuntu Lucid): | |
importance: | Undecided → Medium |
status: | New → Confirmed |
This was fixed with 1.2.11-4 in Natty.