RHSA-2014:0341

Vulnerability from csaf_redhat - Published: 2014-03-31 16:31 - Updated: 2026-01-06 20:20
Summary
Red Hat Security Advisory: wireshark security update
Severity
Moderate
Notes
Topic: Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details: Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. (CVE-2013-3559, CVE-2013-4083, CVE-2014-2281, CVE-2014-2299) Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2012-5595, CVE-2012-5598, CVE-2012-5599, CVE-2012-5600, CVE-2012-6056, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062, CVE-2013-3557, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931, CVE-2013-4932, CVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-5721, CVE-2013-7112) All Wireshark users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of Wireshark must be restarted for the update to take effect.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2012-6056. Note: All CVE users should reference CVE-2012-6056 instead of this candidate.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

[REJECTED CVE] An integer overflow vulnerability has been identified in the dissect_iscsi_pdu() function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark. A remote attacker could provide a specially-crafted iSCSI packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

[REJECTED CVE] A denial of service flaw was found in the way WTP dissector of Wireshark, a network traffic analyzer, performed dissection of certain WTP packet capture files. A remote attacker could provide a specially-crafted WTP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

[REJECTED CVE] A denial of service flaw was found in the way RTCP dissector of Wireshark, a network traffic analyzer, performed dissection of certain RTCP packet capture files. A remote attacker could provide a specially-crafted RTCP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Duplicate TSN count.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

The dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.

Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.

Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.

Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.

Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.

Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

No description is available for this CVE.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.

CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341

Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.

CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 https://access.redhat.com/errata/RHSA-2014:0341
References
https://access.redhat.com/errata/RHSA-2014:0341 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=881742 external
https://bugzilla.redhat.com/show_bug.cgi?id=881748 external
https://bugzilla.redhat.com/show_bug.cgi?id=881771 external
https://bugzilla.redhat.com/show_bug.cgi?id=881809 external
https://bugzilla.redhat.com/show_bug.cgi?id=965190 external
https://bugzilla.redhat.com/show_bug.cgi?id=965193 external
https://bugzilla.redhat.com/show_bug.cgi?id=972686 external
https://bugzilla.redhat.com/show_bug.cgi?id=972688 external
https://bugzilla.redhat.com/show_bug.cgi?id=990166 external
https://bugzilla.redhat.com/show_bug.cgi?id=990170 external
https://bugzilla.redhat.com/show_bug.cgi?id=990172 external
https://bugzilla.redhat.com/show_bug.cgi?id=990175 external
https://bugzilla.redhat.com/show_bug.cgi?id=990178 external
https://bugzilla.redhat.com/show_bug.cgi?id=990179 external
https://bugzilla.redhat.com/show_bug.cgi?id=1007197 external
https://bugzilla.redhat.com/show_bug.cgi?id=1044508 external
https://bugzilla.redhat.com/show_bug.cgi?id=1074109 external
https://bugzilla.redhat.com/show_bug.cgi?id=1074114 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2012-5595 self
https://bugzilla.redhat.com/show_bug.cgi?id=881809 external
https://www.cve.org/CVERecord?id=CVE-2012-5595 external
https://nvd.nist.gov/vuln/detail/CVE-2012-5595 external
https://access.redhat.com/security/cve/CVE-2012-5598 self
https://bugzilla.redhat.com/show_bug.cgi?id=881771 external
https://www.cve.org/CVERecord?id=CVE-2012-5598 external
https://nvd.nist.gov/vuln/detail/CVE-2012-5598 external
https://access.redhat.com/security/cve/CVE-2012-5599 self
https://bugzilla.redhat.com/show_bug.cgi?id=881748 external
https://www.cve.org/CVERecord?id=CVE-2012-5599 external
https://nvd.nist.gov/vuln/detail/CVE-2012-5599 external
https://access.redhat.com/security/cve/CVE-2012-5600 self
https://bugzilla.redhat.com/show_bug.cgi?id=881742 external
https://www.cve.org/CVERecord?id=CVE-2012-5600 external
https://nvd.nist.gov/vuln/detail/CVE-2012-5600 external
https://access.redhat.com/security/cve/CVE-2012-6056 self
https://www.cve.org/CVERecord?id=CVE-2012-6056 external
https://nvd.nist.gov/vuln/detail/CVE-2012-6056 external
https://access.redhat.com/security/cve/CVE-2012-6060 self
https://www.cve.org/CVERecord?id=CVE-2012-6060 external
https://nvd.nist.gov/vuln/detail/CVE-2012-6060 external
https://access.redhat.com/security/cve/CVE-2012-6061 self
https://www.cve.org/CVERecord?id=CVE-2012-6061 external
https://nvd.nist.gov/vuln/detail/CVE-2012-6061 external
https://access.redhat.com/security/cve/CVE-2012-6062 self
https://www.cve.org/CVERecord?id=CVE-2012-6062 external
https://nvd.nist.gov/vuln/detail/CVE-2012-6062 external
https://access.redhat.com/security/cve/CVE-2013-3557 self
https://bugzilla.redhat.com/show_bug.cgi?id=965193 external
https://www.cve.org/CVERecord?id=CVE-2013-3557 external
https://nvd.nist.gov/vuln/detail/CVE-2013-3557 external
https://access.redhat.com/security/cve/CVE-2013-3559 self
https://bugzilla.redhat.com/show_bug.cgi?id=965190 external
https://www.cve.org/CVERecord?id=CVE-2013-3559 external
https://nvd.nist.gov/vuln/detail/CVE-2013-3559 external
https://access.redhat.com/security/cve/CVE-2013-4081 self
https://bugzilla.redhat.com/show_bug.cgi?id=972686 external
https://www.cve.org/CVERecord?id=CVE-2013-4081 external
https://nvd.nist.gov/vuln/detail/CVE-2013-4081 external
http://www.wireshark.org/security/wnpa-sec-2013-39.html external
https://access.redhat.com/security/cve/CVE-2013-4083 self
https://bugzilla.redhat.com/show_bug.cgi?id=972688 external
https://www.cve.org/CVERecord?id=CVE-2013-4083 external
https://nvd.nist.gov/vuln/detail/CVE-2013-4083 external
http://www.wireshark.org/security/wnpa-sec-2013-41.html external
https://access.redhat.com/security/cve/CVE-2013-4927 self
https://bugzilla.redhat.com/show_bug.cgi?id=990166 external
https://www.cve.org/CVERecord?id=CVE-2013-4927 external
https://nvd.nist.gov/vuln/detail/CVE-2013-4927 external
https://access.redhat.com/security/cve/CVE-2013-4931 self
https://bugzilla.redhat.com/show_bug.cgi?id=990170 external
https://www.cve.org/CVERecord?id=CVE-2013-4931 external
https://nvd.nist.gov/vuln/detail/CVE-2013-4931 external
https://access.redhat.com/security/cve/CVE-2013-4932 self
https://bugzilla.redhat.com/show_bug.cgi?id=990172 external
https://www.cve.org/CVERecord?id=CVE-2013-4932 external
https://nvd.nist.gov/vuln/detail/CVE-2013-4932 external
https://access.redhat.com/security/cve/CVE-2013-4933 self
https://bugzilla.redhat.com/show_bug.cgi?id=990175 external
https://www.cve.org/CVERecord?id=CVE-2013-4933 external
https://nvd.nist.gov/vuln/detail/CVE-2013-4933 external
https://access.redhat.com/security/cve/CVE-2013-4934 self
https://bugzilla.redhat.com/show_bug.cgi?id=990178 external
https://www.cve.org/CVERecord?id=CVE-2013-4934 external
https://nvd.nist.gov/vuln/detail/CVE-2013-4934 external
https://access.redhat.com/security/cve/CVE-2013-4935 self
https://bugzilla.redhat.com/show_bug.cgi?id=990179 external
https://www.cve.org/CVERecord?id=CVE-2013-4935 external
https://nvd.nist.gov/vuln/detail/CVE-2013-4935 external
https://access.redhat.com/security/cve/CVE-2013-5721 self
https://bugzilla.redhat.com/show_bug.cgi?id=1007197 external
https://www.cve.org/CVERecord?id=CVE-2013-5721 external
https://nvd.nist.gov/vuln/detail/CVE-2013-5721 external
https://access.redhat.com/security/cve/CVE-2013-7112 self
https://bugzilla.redhat.com/show_bug.cgi?id=1044508 external
https://www.cve.org/CVERecord?id=CVE-2013-7112 external
https://nvd.nist.gov/vuln/detail/CVE-2013-7112 external
http://www.wireshark.org/security/wnpa-sec-2013-66.html external
https://access.redhat.com/security/cve/CVE-2014-2281 self
https://bugzilla.redhat.com/show_bug.cgi?id=1074114 external
https://www.cve.org/CVERecord?id=CVE-2014-2281 external
https://nvd.nist.gov/vuln/detail/CVE-2014-2281 external
http://www.wireshark.org/security/wnpa-sec-2014-01.html external
https://access.redhat.com/security/cve/CVE-2014-2299 self
https://bugzilla.redhat.com/show_bug.cgi?id=1074109 external
https://www.cve.org/CVERecord?id=CVE-2014-2299 external
https://nvd.nist.gov/vuln/detail/CVE-2014-2299 external
http://www.wireshark.org/security/wnpa-sec-2014-04.html external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated wireshark packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Wireshark is a network protocol analyzer. It is used to capture and browse\nthe traffic running on a computer network.\n\nMultiple flaws were found in Wireshark. If Wireshark read a malformed\npacket off a network or opened a malicious dump file, it could crash or,\npossibly, execute arbitrary code as the user running Wireshark.\n(CVE-2013-3559, CVE-2013-4083, CVE-2014-2281, CVE-2014-2299)\n\nSeveral denial of service flaws were found in Wireshark. Wireshark could\ncrash or stop responding if it read a malformed packet off a network, or\nopened a malicious dump file. (CVE-2012-5595, CVE-2012-5598, CVE-2012-5599,\nCVE-2012-5600, CVE-2012-6056, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,\nCVE-2013-3557, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931, CVE-2013-4932,\nCVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-5721, CVE-2013-7112)\n\nAll Wireshark users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. All running instances\nof Wireshark must be restarted for the update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2014:0341",
        "url": "https://access.redhat.com/errata/RHSA-2014:0341"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "881742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742"
      },
      {
        "category": "external",
        "summary": "881748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748"
      },
      {
        "category": "external",
        "summary": "881771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771"
      },
      {
        "category": "external",
        "summary": "881809",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809"
      },
      {
        "category": "external",
        "summary": "965190",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965190"
      },
      {
        "category": "external",
        "summary": "965193",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965193"
      },
      {
        "category": "external",
        "summary": "972686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972686"
      },
      {
        "category": "external",
        "summary": "972688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972688"
      },
      {
        "category": "external",
        "summary": "990166",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990166"
      },
      {
        "category": "external",
        "summary": "990170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990170"
      },
      {
        "category": "external",
        "summary": "990172",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990172"
      },
      {
        "category": "external",
        "summary": "990175",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990175"
      },
      {
        "category": "external",
        "summary": "990178",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990178"
      },
      {
        "category": "external",
        "summary": "990179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990179"
      },
      {
        "category": "external",
        "summary": "1007197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197"
      },
      {
        "category": "external",
        "summary": "1044508",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044508"
      },
      {
        "category": "external",
        "summary": "1074109",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074109"
      },
      {
        "category": "external",
        "summary": "1074114",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074114"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0341.json"
      }
    ],
    "title": "Red Hat Security Advisory: wireshark security update",
    "tracking": {
      "current_release_date": "2026-01-06T20:20:51+00:00",
      "generator": {
        "date": "2026-01-06T20:20:51+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.14"
        }
      },
      "id": "RHSA-2014:0341",
      "initial_release_date": "2014-03-31T16:31:57+00:00",
      "revision_history": [
        {
          "date": "2014-03-31T16:31:57+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2014-03-31T16:31:57+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-01-06T20:20:51+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client-5.10.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                  "product_id": "5Client-Workstation-5.10.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server-5.10.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
                "product": {
                  "name": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
                  "product_id": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
                "product": {
                  "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
                  "product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-0:1.0.15-6.el5_10.i386",
                "product": {
                  "name": "wireshark-0:1.0.15-6.el5_10.i386",
                  "product_id": "wireshark-0:1.0.15-6.el5_10.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
                "product": {
                  "name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
                  "product_id": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
                "product": {
                  "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
                  "product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-0:1.0.15-6.el5_10.x86_64",
                "product": {
                  "name": "wireshark-0:1.0.15-6.el5_10.x86_64",
                  "product_id": "wireshark-0:1.0.15-6.el5_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-0:1.0.15-6.el5_10.src",
                "product": {
                  "name": "wireshark-0:1.0.15-6.el5_10.src",
                  "product_id": "wireshark-0:1.0.15-6.el5_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
                "product": {
                  "name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
                  "product_id": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-0:1.0.15-6.el5_10.ia64",
                "product": {
                  "name": "wireshark-0:1.0.15-6.el5_10.ia64",
                  "product_id": "wireshark-0:1.0.15-6.el5_10.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
                "product": {
                  "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
                  "product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
                "product": {
                  "name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
                  "product_id": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-0:1.0.15-6.el5_10.ppc",
                "product": {
                  "name": "wireshark-0:1.0.15-6.el5_10.ppc",
                  "product_id": "wireshark-0:1.0.15-6.el5_10.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
                "product": {
                  "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
                  "product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
                "product": {
                  "name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
                  "product_id": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-0:1.0.15-6.el5_10.s390x",
                "product": {
                  "name": "wireshark-0:1.0.15-6.el5_10.s390x",
                  "product_id": "wireshark-0:1.0.15-6.el5_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
                "product": {
                  "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
                  "product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.i386",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.ia64",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.ppc",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.s390x",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.src",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
        "relates_to_product_reference": "5Client-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.i386",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.ia64",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.ppc",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.s390x",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.src",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
        "relates_to_product_reference": "5Client-Workstation-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.i386",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.ia64",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.ppc",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.s390x",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.src",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64"
        },
        "product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64"
        },
        "product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
        "relates_to_product_reference": "5Server-5.10.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        },
        "product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
        "relates_to_product_reference": "5Server-5.10.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2012-5595",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2012-11-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "881809"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2012-6056. Note: All CVE users should reference CVE-2012-6056 instead of this candidate.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-5595"
        },
        {
          "category": "external",
          "summary": "RHBZ#881809",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5595",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-5595"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5595",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5595"
        }
      ],
      "release_date": "2012-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)"
    },
    {
      "cve": "CVE-2012-5598",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2012-11-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "881771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "[REJECTED CVE] An integer overflow vulnerability has been identified in the dissect_iscsi_pdu() function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark. A remote attacker could provide a specially-crafted iSCSI packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6060. Note: All CVE users should reference CVE-2012-6060 instead of this candidate.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-5598"
        },
        {
          "category": "external",
          "summary": "RHBZ#881771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5598",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-5598"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5598",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5598"
        }
      ],
      "release_date": "2012-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)"
    },
    {
      "cve": "CVE-2012-5599",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2012-11-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "881748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "[REJECTED CVE] A denial of service flaw was found in the way WTP dissector of Wireshark, a network traffic analyzer, performed dissection of certain WTP packet capture files. A remote attacker could provide a specially-crafted WTP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6061. Note: All CVE users should reference CVE-2012-6061 instead of this candidate.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-5599"
        },
        {
          "category": "external",
          "summary": "RHBZ#881748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5599",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-5599"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5599",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5599"
        }
      ],
      "release_date": "2012-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)"
    },
    {
      "cve": "CVE-2012-5600",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2012-11-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "881742"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "[REJECTED CVE] A denial of service flaw was found in the way RTCP dissector of Wireshark, a network traffic analyzer, performed dissection of certain RTCP packet capture files. A remote attacker could provide a specially-crafted RTCP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6062. Note: All CVE users should reference CVE-2012-6062 instead of this candidate.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-5600"
        },
        {
          "category": "external",
          "summary": "RHBZ#881742",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5600",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-5600"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5600",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5600"
        }
      ],
      "release_date": "2012-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)"
    },
    {
      "cve": "CVE-2012-6056",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2012-11-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "881809"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Duplicate TSN count.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-6056"
        },
        {
          "category": "external",
          "summary": "RHBZ#881809",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6056",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-6056"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6056",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6056"
        }
      ],
      "release_date": "2012-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)"
    },
    {
      "cve": "CVE-2012-6060",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2012-11-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "881771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-6060"
        },
        {
          "category": "external",
          "summary": "RHBZ#881771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6060",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-6060"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6060",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6060"
        }
      ],
      "release_date": "2012-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)"
    },
    {
      "cve": "CVE-2012-6061",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2012-11-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "881748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-6061"
        },
        {
          "category": "external",
          "summary": "RHBZ#881748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6061",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-6061"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6061",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6061"
        }
      ],
      "release_date": "2012-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)"
    },
    {
      "cve": "CVE-2012-6062",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2012-11-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "881742"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-6062"
        },
        {
          "category": "external",
          "summary": "RHBZ#881742",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6062",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-6062"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6062",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6062"
        }
      ],
      "release_date": "2012-11-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)"
    },
    {
      "cve": "CVE-2013-3557",
      "discovery_date": "2013-05-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "965193"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-3557"
        },
        {
          "category": "external",
          "summary": "RHBZ#965193",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965193"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-3557",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-3557"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3557",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3557"
        }
      ],
      "release_date": "2013-05-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)"
    },
    {
      "cve": "CVE-2013-3559",
      "discovery_date": "2013-05-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "965190"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-3559"
        },
        {
          "category": "external",
          "summary": "RHBZ#965190",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965190"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-3559",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-3559"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3559",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3559"
        }
      ],
      "release_date": "2013-05-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)"
    },
    {
      "cve": "CVE-2013-4081",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2013-06-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "972686"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-4081"
        },
        {
          "category": "external",
          "summary": "RHBZ#972686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972686"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-4081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4081"
        },
        {
          "category": "external",
          "summary": "http://www.wireshark.org/security/wnpa-sec-2013-39.html",
          "url": "http://www.wireshark.org/security/wnpa-sec-2013-39.html"
        }
      ],
      "release_date": "2013-06-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)"
    },
    {
      "cve": "CVE-2013-4083",
      "discovery_date": "2013-06-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "972688"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-4083"
        },
        {
          "category": "external",
          "summary": "RHBZ#972688",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972688"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-4083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4083"
        },
        {
          "category": "external",
          "summary": "http://www.wireshark.org/security/wnpa-sec-2013-41.html",
          "url": "http://www.wireshark.org/security/wnpa-sec-2013-41.html"
        }
      ],
      "release_date": "2013-06-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)"
    },
    {
      "cve": "CVE-2013-4927",
      "discovery_date": "2013-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "990166"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-4927"
        },
        {
          "category": "external",
          "summary": "RHBZ#990166",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990166"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4927",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-4927"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4927",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4927"
        }
      ],
      "release_date": "2013-07-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)"
    },
    {
      "cve": "CVE-2013-4931",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2013-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "990170"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-4931"
        },
        {
          "category": "external",
          "summary": "RHBZ#990170",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990170"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4931",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-4931"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4931",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4931"
        }
      ],
      "release_date": "2013-07-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)"
    },
    {
      "cve": "CVE-2013-4932",
      "discovery_date": "2013-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "990172"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-4932"
        },
        {
          "category": "external",
          "summary": "RHBZ#990172",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990172"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4932",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-4932"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4932",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4932"
        }
      ],
      "release_date": "2013-07-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)"
    },
    {
      "cve": "CVE-2013-4933",
      "discovery_date": "2013-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "990175"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-4933"
        },
        {
          "category": "external",
          "summary": "RHBZ#990175",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990175"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4933",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-4933"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4933",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4933"
        }
      ],
      "release_date": "2013-07-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)"
    },
    {
      "cve": "CVE-2013-4934",
      "discovery_date": "2013-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "990178"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-4934"
        },
        {
          "category": "external",
          "summary": "RHBZ#990178",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990178"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4934",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-4934"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4934",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4934"
        }
      ],
      "release_date": "2013-07-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)"
    },
    {
      "cve": "CVE-2013-4935",
      "discovery_date": "2013-07-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "990179"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-4935"
        },
        {
          "category": "external",
          "summary": "RHBZ#990179",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990179"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4935",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-4935"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4935",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4935"
        }
      ],
      "release_date": "2013-07-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)"
    },
    {
      "cve": "CVE-2013-5721",
      "discovery_date": "2013-09-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1007197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-5721"
        },
        {
          "category": "external",
          "summary": "RHBZ#1007197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-5721",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-5721"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5721",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5721"
        }
      ],
      "release_date": "2013-09-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)"
    },
    {
      "cve": "CVE-2013-7112",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2013-12-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1044508"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "No description is available for this CVE.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2013-7112"
        },
        {
          "category": "external",
          "summary": "RHBZ#1044508",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044508"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2013-7112",
          "url": "https://www.cve.org/CVERecord?id=CVE-2013-7112"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-7112",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7112"
        },
        {
          "category": "external",
          "summary": "http://www.wireshark.org/security/wnpa-sec-2013-66.html",
          "url": "http://www.wireshark.org/security/wnpa-sec-2013-66.html"
        }
      ],
      "release_date": "2013-12-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)"
    },
    {
      "cve": "CVE-2014-2281",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2014-03-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1074114"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: NFS dissector crash (wnpa-sec-2014-01)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-2281"
        },
        {
          "category": "external",
          "summary": "RHBZ#1074114",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074114"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-2281",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-2281"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-2281",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2281"
        },
        {
          "category": "external",
          "summary": "http://www.wireshark.org/security/wnpa-sec-2014-01.html",
          "url": "http://www.wireshark.org/security/wnpa-sec-2014-01.html"
        }
      ],
      "release_date": "2014-03-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "wireshark: NFS dissector crash (wnpa-sec-2014-01)"
    },
    {
      "cve": "CVE-2014-2299",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2014-03-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1074109"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
          "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
          "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2014-2299"
        },
        {
          "category": "external",
          "summary": "RHBZ#1074109",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074109"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2014-2299",
          "url": "https://www.cve.org/CVERecord?id=CVE-2014-2299"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-2299",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2299"
        },
        {
          "category": "external",
          "summary": "http://www.wireshark.org/security/wnpa-sec-2014-04.html",
          "url": "http://www.wireshark.org/security/wnpa-sec-2014-04.html"
        }
      ],
      "release_date": "2014-03-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2014-03-31T16:31:57+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
          "product_ids": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2014:0341"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
            "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
            "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…