RHSA-2014:0341
Vulnerability from csaf_redhat - Published: 2014-03-31 16:31 - Updated: 2026-01-06 20:20[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2012-6056. Note: All CVE users should reference CVE-2012-6056 instead of this candidate.
[REJECTED CVE] An integer overflow vulnerability has been identified in the dissect_iscsi_pdu() function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark. A remote attacker could provide a specially-crafted iSCSI packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.
[REJECTED CVE] A denial of service flaw was found in the way WTP dissector of Wireshark, a network traffic analyzer, performed dissection of certain WTP packet capture files. A remote attacker could provide a specially-crafted WTP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.
[REJECTED CVE] A denial of service flaw was found in the way RTCP dissector of Wireshark, a network traffic analyzer, performed dissection of certain RTCP packet capture files. A remote attacker could provide a specially-crafted RTCP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.
Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Duplicate TSN count.
Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.
The dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.
The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.
Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.
The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
No description is available for this CVE.
The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.
Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated wireshark packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having Moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Wireshark is a network protocol analyzer. It is used to capture and browse\nthe traffic running on a computer network.\n\nMultiple flaws were found in Wireshark. If Wireshark read a malformed\npacket off a network or opened a malicious dump file, it could crash or,\npossibly, execute arbitrary code as the user running Wireshark.\n(CVE-2013-3559, CVE-2013-4083, CVE-2014-2281, CVE-2014-2299)\n\nSeveral denial of service flaws were found in Wireshark. Wireshark could\ncrash or stop responding if it read a malformed packet off a network, or\nopened a malicious dump file. (CVE-2012-5595, CVE-2012-5598, CVE-2012-5599,\nCVE-2012-5600, CVE-2012-6056, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,\nCVE-2013-3557, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931, CVE-2013-4932,\nCVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-5721, CVE-2013-7112)\n\nAll Wireshark users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. All running instances\nof Wireshark must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:0341",
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "881742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742"
},
{
"category": "external",
"summary": "881748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748"
},
{
"category": "external",
"summary": "881771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771"
},
{
"category": "external",
"summary": "881809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809"
},
{
"category": "external",
"summary": "965190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=965190"
},
{
"category": "external",
"summary": "965193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=965193"
},
{
"category": "external",
"summary": "972686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=972686"
},
{
"category": "external",
"summary": "972688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=972688"
},
{
"category": "external",
"summary": "990166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990166"
},
{
"category": "external",
"summary": "990170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990170"
},
{
"category": "external",
"summary": "990172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990172"
},
{
"category": "external",
"summary": "990175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990175"
},
{
"category": "external",
"summary": "990178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990178"
},
{
"category": "external",
"summary": "990179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990179"
},
{
"category": "external",
"summary": "1007197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197"
},
{
"category": "external",
"summary": "1044508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044508"
},
{
"category": "external",
"summary": "1074109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074109"
},
{
"category": "external",
"summary": "1074114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074114"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0341.json"
}
],
"title": "Red Hat Security Advisory: wireshark security update",
"tracking": {
"current_release_date": "2026-01-06T20:20:51+00:00",
"generator": {
"date": "2026-01-06T20:20:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2014:0341",
"initial_release_date": "2014-03-31T16:31:57+00:00",
"revision_history": [
{
"date": "2014-03-31T16:31:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-03-31T16:31:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-06T20:20:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"product": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"product_id": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"product": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.i386",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.i386",
"product_id": "wireshark-0:1.0.15-6.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"product": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"product_id": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"product": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.x86_64",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.x86_64",
"product_id": "wireshark-0:1.0.15-6.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.src",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.src",
"product_id": "wireshark-0:1.0.15-6.el5_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"product": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"product_id": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.ia64",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.ia64",
"product_id": "wireshark-0:1.0.15-6.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"product": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"product": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"product_id": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.ppc",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.ppc",
"product_id": "wireshark-0:1.0.15-6.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"product": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"product": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"product_id": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-6.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "wireshark-0:1.0.15-6.el5_10.s390x",
"product": {
"name": "wireshark-0:1.0.15-6.el5_10.s390x",
"product_id": "wireshark-0:1.0.15-6.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark@1.0.15-6.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"product": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"product_id": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-6.el5_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.src",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.src",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.src",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
},
"product_reference": "wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-5595",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881809"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2012-6056. Note: All CVE users should reference CVE-2012-6056 instead of this candidate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5595"
},
{
"category": "external",
"summary": "RHBZ#881809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5595",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5595"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5595",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5595"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)"
},
{
"cve": "CVE-2012-5598",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881771"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] An integer overflow vulnerability has been identified in the dissect_iscsi_pdu() function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark. A remote attacker could provide a specially-crafted iSCSI packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6060. Note: All CVE users should reference CVE-2012-6060 instead of this candidate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5598"
},
{
"category": "external",
"summary": "RHBZ#881771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5598",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5598"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)"
},
{
"cve": "CVE-2012-5599",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881748"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A denial of service flaw was found in the way WTP dissector of Wireshark, a network traffic analyzer, performed dissection of certain WTP packet capture files. A remote attacker could provide a specially-crafted WTP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6061. Note: All CVE users should reference CVE-2012-6061 instead of this candidate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5599"
},
{
"category": "external",
"summary": "RHBZ#881748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5599",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5599"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5599",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5599"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)"
},
{
"cve": "CVE-2012-5600",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881742"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A denial of service flaw was found in the way RTCP dissector of Wireshark, a network traffic analyzer, performed dissection of certain RTCP packet capture files. A remote attacker could provide a specially-crafted RTCP packet / packet capture that, once processed, would lead to excessive CPU consumption or into situation where tshark executable would enter an infinite loop, when trying to process the crafted packet / packet capture file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2012-6062. Note: All CVE users should reference CVE-2012-6062 instead of this candidate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5600"
},
{
"category": "external",
"summary": "RHBZ#881742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5600"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)"
},
{
"cve": "CVE-2012-6056",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881809"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Duplicate TSN count.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6056"
},
{
"category": "external",
"summary": "RHBZ#881809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6056",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6056"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)"
},
{
"cve": "CVE-2012-6060",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881771"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6060"
},
{
"category": "external",
"summary": "RHBZ#881771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6060",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6060"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6060",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6060"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)"
},
{
"cve": "CVE-2012-6061",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881748"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6061"
},
{
"category": "external",
"summary": "RHBZ#881748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6061",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6061"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6061",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6061"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)"
},
{
"cve": "CVE-2012-6062",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2012-11-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "881742"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6062"
},
{
"category": "external",
"summary": "RHBZ#881742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6062",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6062"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6062",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6062"
}
],
"release_date": "2012-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)"
},
{
"cve": "CVE-2013-3557",
"discovery_date": "2013-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "965193"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-3557"
},
{
"category": "external",
"summary": "RHBZ#965193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=965193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-3557",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3557"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3557",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3557"
}
],
"release_date": "2013-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599)"
},
{
"cve": "CVE-2013-3559",
"discovery_date": "2013-05-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "965190"
}
],
"notes": [
{
"category": "description",
"text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-3559"
},
{
"category": "external",
"summary": "RHBZ#965190",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=965190"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-3559",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3559"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3559",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3559"
}
],
"release_date": "2013-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541)"
},
{
"cve": "CVE-2013-4081",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2013-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "972686"
}
],
"notes": [
{
"category": "description",
"text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4081"
},
{
"category": "external",
"summary": "RHBZ#972686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=972686"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4081",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4081"
},
{
"category": "external",
"summary": "http://www.wireshark.org/security/wnpa-sec-2013-39.html",
"url": "http://www.wireshark.org/security/wnpa-sec-2013-39.html"
}
],
"release_date": "2013-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39)"
},
{
"cve": "CVE-2013-4083",
"discovery_date": "2013-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "972688"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4083"
},
{
"category": "external",
"summary": "RHBZ#972688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=972688"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4083"
},
{
"category": "external",
"summary": "http://www.wireshark.org/security/wnpa-sec-2013-41.html",
"url": "http://www.wireshark.org/security/wnpa-sec-2013-41.html"
}
],
"release_date": "2013-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41)"
},
{
"cve": "CVE-2013-4927",
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990166"
}
],
"notes": [
{
"category": "description",
"text": "Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4927"
},
{
"category": "external",
"summary": "RHBZ#990166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4927",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4927"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4927",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4927"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45)"
},
{
"cve": "CVE-2013-4931",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990170"
}
],
"notes": [
{
"category": "description",
"text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4931"
},
{
"category": "external",
"summary": "RHBZ#990170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4931",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4931"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4931",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4931"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49)"
},
{
"cve": "CVE-2013-4932",
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990172"
}
],
"notes": [
{
"category": "description",
"text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4932"
},
{
"category": "external",
"summary": "RHBZ#990172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990172"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4932"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4932",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4932"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50)"
},
{
"cve": "CVE-2013-4933",
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990175"
}
],
"notes": [
{
"category": "description",
"text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4933"
},
{
"category": "external",
"summary": "RHBZ#990175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990175"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4933"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4933",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4933"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51)"
},
{
"cve": "CVE-2013-4934",
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990178"
}
],
"notes": [
{
"category": "description",
"text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4934"
},
{
"category": "external",
"summary": "RHBZ#990178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4934"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933)"
},
{
"cve": "CVE-2013-4935",
"discovery_date": "2013-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "990179"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4935"
},
{
"category": "external",
"summary": "RHBZ#990179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=990179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4935"
}
],
"release_date": "2013-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52)"
},
{
"cve": "CVE-2013-5721",
"discovery_date": "2013-09-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1007197"
}
],
"notes": [
{
"category": "description",
"text": "The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-5721"
},
{
"category": "external",
"summary": "RHBZ#1007197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-5721",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-5721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5721"
}
],
"release_date": "2013-09-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079)"
},
{
"cve": "CVE-2013-7112",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2013-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1044508"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-7112"
},
{
"category": "external",
"summary": "RHBZ#1044508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044508"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-7112",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7112"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-7112",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7112"
},
{
"category": "external",
"summary": "http://www.wireshark.org/security/wnpa-sec-2013-66.html",
"url": "http://www.wireshark.org/security/wnpa-sec-2013-66.html"
}
],
"release_date": "2013-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)"
},
{
"cve": "CVE-2014-2281",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2014-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1074114"
}
],
"notes": [
{
"category": "description",
"text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: NFS dissector crash (wnpa-sec-2014-01)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-2281"
},
{
"category": "external",
"summary": "RHBZ#1074114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-2281",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2281"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-2281",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2281"
},
{
"category": "external",
"summary": "http://www.wireshark.org/security/wnpa-sec-2014-01.html",
"url": "http://www.wireshark.org/security/wnpa-sec-2014-01.html"
}
],
"release_date": "2014-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wireshark: NFS dissector crash (wnpa-sec-2014-01)"
},
{
"cve": "CVE-2014-2299",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2014-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1074109"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-2299"
},
{
"category": "external",
"summary": "RHBZ#1074109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2299"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-2299",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2299"
},
{
"category": "external",
"summary": "http://www.wireshark.org/security/wnpa-sec-2014-04.html",
"url": "http://www.wireshark.org/security/wnpa-sec-2014-04.html"
}
],
"release_date": "2014-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-03-31T16:31:57+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:0341"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Client-Workstation-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Client-Workstation-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.src",
"5Server-5.10.Z:wireshark-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-debuginfo-0:1.0.15-6.el5_10.x86_64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.i386",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ia64",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.ppc",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.s390x",
"5Server-5.10.Z:wireshark-gnome-0:1.0.15-6.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.