SUSE-SU-2015:0653-1
Vulnerability from csaf_suse - Published: 2014-11-14 12:53 - Updated: 2014-11-14 12:53Summary
Security update for wireshark
Severity
Moderate
Notes
Title of the patch: Security update for wireshark
Description of the patch:
wireshark has been updated to version 1.10.11 to fix five security issues.
These security issues have been fixed:
* SigComp UDVM buffer overflow (CVE-2014-8710).
* AMQP dissector crash (CVE-2014-8711).
* NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
* TN5250 infinite loops (CVE-2014-8714).
This non-security issue has been fixed:
* enable zlib (bnc#899303).
Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
<https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html>
Security Issues:
* CVE-2014-8711
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711>
* CVE-2014-8710
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710>
* CVE-2014-8714
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714>
* CVE-2014-8712
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712>
* CVE-2014-8713
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713>
Patchnames: sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for wireshark",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nwireshark has been updated to version 1.10.11 to fix five security issues.\n\nThese security issues have been fixed:\n\n * SigComp UDVM buffer overflow (CVE-2014-8710).\n * AMQP dissector crash (CVE-2014-8711).\n * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).\n * TN5250 infinite loops (CVE-2014-8714).\n\nThis non-security issue has been fixed:\n\n * enable zlib (bnc#899303).\n\nFurther bug fixes and updated protocol support as listed in:\n\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\n\u003chttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\u003e\n\nSecurity Issues:\n\n * CVE-2014-8711\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711\u003e\n * CVE-2014-8710\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710\u003e\n * CVE-2014-8714\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714\u003e\n * CVE-2014-8712\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712\u003e\n * CVE-2014-8713\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713\u003e\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0653-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2015:0653-1",
"url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150653-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2015:0653-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html"
},
{
"category": "self",
"summary": "SUSE Bug 813217",
"url": "https://bugzilla.suse.com/813217"
},
{
"category": "self",
"summary": "SUSE Bug 816517",
"url": "https://bugzilla.suse.com/816517"
},
{
"category": "self",
"summary": "SUSE Bug 816887",
"url": "https://bugzilla.suse.com/816887"
},
{
"category": "self",
"summary": "SUSE Bug 820973",
"url": "https://bugzilla.suse.com/820973"
},
{
"category": "self",
"summary": "SUSE Bug 824900",
"url": "https://bugzilla.suse.com/824900"
},
{
"category": "self",
"summary": "SUSE Bug 831718",
"url": "https://bugzilla.suse.com/831718"
},
{
"category": "self",
"summary": "SUSE Bug 839607",
"url": "https://bugzilla.suse.com/839607"
},
{
"category": "self",
"summary": "SUSE Bug 848738",
"url": "https://bugzilla.suse.com/848738"
},
{
"category": "self",
"summary": "SUSE Bug 855980",
"url": "https://bugzilla.suse.com/855980"
},
{
"category": "self",
"summary": "SUSE Bug 856495",
"url": "https://bugzilla.suse.com/856495"
},
{
"category": "self",
"summary": "SUSE Bug 856496",
"url": "https://bugzilla.suse.com/856496"
},
{
"category": "self",
"summary": "SUSE Bug 856498",
"url": "https://bugzilla.suse.com/856498"
},
{
"category": "self",
"summary": "SUSE Bug 867485",
"url": "https://bugzilla.suse.com/867485"
},
{
"category": "self",
"summary": "SUSE Bug 889854",
"url": "https://bugzilla.suse.com/889854"
},
{
"category": "self",
"summary": "SUSE Bug 889899",
"url": "https://bugzilla.suse.com/889899"
},
{
"category": "self",
"summary": "SUSE Bug 889900",
"url": "https://bugzilla.suse.com/889900"
},
{
"category": "self",
"summary": "SUSE Bug 889901",
"url": "https://bugzilla.suse.com/889901"
},
{
"category": "self",
"summary": "SUSE Bug 889906",
"url": "https://bugzilla.suse.com/889906"
},
{
"category": "self",
"summary": "SUSE Bug 897055",
"url": "https://bugzilla.suse.com/897055"
},
{
"category": "self",
"summary": "SUSE Bug 899303",
"url": "https://bugzilla.suse.com/899303"
},
{
"category": "self",
"summary": "SUSE Bug 905245",
"url": "https://bugzilla.suse.com/905245"
},
{
"category": "self",
"summary": "SUSE Bug 905246",
"url": "https://bugzilla.suse.com/905246"
},
{
"category": "self",
"summary": "SUSE Bug 905247",
"url": "https://bugzilla.suse.com/905247"
},
{
"category": "self",
"summary": "SUSE Bug 905248",
"url": "https://bugzilla.suse.com/905248"
},
{
"category": "self",
"summary": "SUSE Bug 912365",
"url": "https://bugzilla.suse.com/912365"
},
{
"category": "self",
"summary": "SUSE Bug 912368",
"url": "https://bugzilla.suse.com/912368"
},
{
"category": "self",
"summary": "SUSE Bug 912369",
"url": "https://bugzilla.suse.com/912369"
},
{
"category": "self",
"summary": "SUSE Bug 912370",
"url": "https://bugzilla.suse.com/912370"
},
{
"category": "self",
"summary": "SUSE Bug 912372",
"url": "https://bugzilla.suse.com/912372"
},
{
"category": "self",
"summary": "SUSE Bug 920696",
"url": "https://bugzilla.suse.com/920696"
},
{
"category": "self",
"summary": "SUSE Bug 920697",
"url": "https://bugzilla.suse.com/920697"
},
{
"category": "self",
"summary": "SUSE Bug 920699",
"url": "https://bugzilla.suse.com/920699"
},
{
"category": "self",
"summary": "SUSE Bug 930691",
"url": "https://bugzilla.suse.com/930691"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2486 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2487 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-3555 page",
"url": "https://www.suse.com/security/cve/CVE-2013-3555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-3556 page",
"url": "https://www.suse.com/security/cve/CVE-2013-3556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-3557 page",
"url": "https://www.suse.com/security/cve/CVE-2013-3557/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-3558 page",
"url": "https://www.suse.com/security/cve/CVE-2013-3558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-3559 page",
"url": "https://www.suse.com/security/cve/CVE-2013-3559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-3560 page",
"url": "https://www.suse.com/security/cve/CVE-2013-3560/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-3561 page",
"url": "https://www.suse.com/security/cve/CVE-2013-3561/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-3562 page",
"url": "https://www.suse.com/security/cve/CVE-2013-3562/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4074 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4075 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4076 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4077 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4078 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4079 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4080 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4081 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4082 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4083 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4929 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4929/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4930 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4930/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4931 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4932 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4933 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4933/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4934 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4935 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6336 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6337 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6338 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6339 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6340 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-7112 page",
"url": "https://www.suse.com/security/cve/CVE-2013-7112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-7113 page",
"url": "https://www.suse.com/security/cve/CVE-2013-7113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-7114 page",
"url": "https://www.suse.com/security/cve/CVE-2013-7114/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2281 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2282 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2282/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2283 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2299 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2299/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6421 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6422 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6423 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6424 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6427 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6427/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6428 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6429 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6430 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6430/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6431 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6431/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6432 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6432/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8710 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8711 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8712 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8713 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8714 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0559 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0560 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0560/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0561 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0561/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0562 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0562/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0563 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0564 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2188 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2189 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2191 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3811 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3812 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3814 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3814/"
}
],
"title": "Security update for wireshark",
"tracking": {
"current_release_date": "2014-11-14T12:53:20Z",
"generator": {
"date": "2014-11-14T12:53:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2015:0653-1",
"initial_release_date": "2014-11-14T12:53:20Z",
"revision_history": [
{
"date": "2014-11-14T12:53:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "wireshark-1.10.11-0.2.1.i586",
"product": {
"name": "wireshark-1.10.11-0.2.1.i586",
"product_id": "wireshark-1.10.11-0.2.1.i586"
}
},
{
"category": "product_version",
"name": "wireshark-devel-1.10.11-0.2.1.i586",
"product": {
"name": "wireshark-devel-1.10.11-0.2.1.i586",
"product_id": "wireshark-devel-1.10.11-0.2.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-devel-1.10.11-0.2.1.ia64",
"product": {
"name": "wireshark-devel-1.10.11-0.2.1.ia64",
"product_id": "wireshark-devel-1.10.11-0.2.1.ia64"
}
},
{
"category": "product_version",
"name": "wireshark-1.10.11-0.2.1.ia64",
"product": {
"name": "wireshark-1.10.11-0.2.1.ia64",
"product_id": "wireshark-1.10.11-0.2.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-devel-1.10.11-0.2.1.ppc64",
"product": {
"name": "wireshark-devel-1.10.11-0.2.1.ppc64",
"product_id": "wireshark-devel-1.10.11-0.2.1.ppc64"
}
},
{
"category": "product_version",
"name": "wireshark-1.10.11-0.2.1.ppc64",
"product": {
"name": "wireshark-1.10.11-0.2.1.ppc64",
"product_id": "wireshark-1.10.11-0.2.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-devel-1.10.11-0.2.1.s390x",
"product": {
"name": "wireshark-devel-1.10.11-0.2.1.s390x",
"product_id": "wireshark-devel-1.10.11-0.2.1.s390x"
}
},
{
"category": "product_version",
"name": "wireshark-1.10.11-0.2.1.s390x",
"product": {
"name": "wireshark-1.10.11-0.2.1.s390x",
"product_id": "wireshark-1.10.11-0.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "wireshark-1.10.11-0.2.1.x86_64",
"product": {
"name": "wireshark-1.10.11-0.2.1.x86_64",
"product_id": "wireshark-1.10.11-0.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-devel-1.10.11-0.2.1.x86_64",
"product": {
"name": "wireshark-devel-1.10.11-0.2.1.x86_64",
"product_id": "wireshark-devel-1.10.11-0.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sled:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586"
},
"product_reference": "wireshark-1.10.11-0.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64"
},
"product_reference": "wireshark-1.10.11-0.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586"
},
"product_reference": "wireshark-devel-1.10.11-0.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64"
},
"product_reference": "wireshark-devel-1.10.11-0.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64"
},
"product_reference": "wireshark-devel-1.10.11-0.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x"
},
"product_reference": "wireshark-devel-1.10.11-0.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-devel-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
},
"product_reference": "wireshark-devel-1.10.11-0.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586"
},
"product_reference": "wireshark-1.10.11-0.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3",
"product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64"
},
"product_reference": "wireshark-1.10.11-0.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586"
},
"product_reference": "wireshark-1.10.11-0.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64"
},
"product_reference": "wireshark-1.10.11-0.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64"
},
"product_reference": "wireshark-1.10.11-0.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x"
},
"product_reference": "wireshark-1.10.11-0.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3",
"product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64"
},
"product_reference": "wireshark-1.10.11-0.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586"
},
"product_reference": "wireshark-1.10.11-0.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64"
},
"product_reference": "wireshark-1.10.11-0.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64"
},
"product_reference": "wireshark-1.10.11-0.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x"
},
"product_reference": "wireshark-1.10.11-0.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64"
},
"product_reference": "wireshark-1.10.11-0.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586"
},
"product_reference": "wireshark-1.10.11-0.2.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64"
},
"product_reference": "wireshark-1.10.11-0.2.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64"
},
"product_reference": "wireshark-1.10.11-0.2.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x"
},
"product_reference": "wireshark-1.10.11-0.2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64"
},
"product_reference": "wireshark-1.10.11-0.2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-2486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2486"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2486",
"url": "https://www.suse.com/security/cve/CVE-2013-2486"
},
{
"category": "external",
"summary": "SUSE Bug 807942 for CVE-2013-2486",
"url": "https://bugzilla.suse.com/807942"
},
{
"category": "external",
"summary": "SUSE Bug 820566 for CVE-2013-2486",
"url": "https://bugzilla.suse.com/820566"
},
{
"category": "external",
"summary": "SUSE Bug 820973 for CVE-2013-2486",
"url": "https://bugzilla.suse.com/820973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-2486"
},
{
"cve": "CVE-2013-2487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2487"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2487",
"url": "https://www.suse.com/security/cve/CVE-2013-2487"
},
{
"category": "external",
"summary": "SUSE Bug 807942 for CVE-2013-2487",
"url": "https://bugzilla.suse.com/807942"
},
{
"category": "external",
"summary": "SUSE Bug 820566 for CVE-2013-2487",
"url": "https://bugzilla.suse.com/820566"
},
{
"category": "external",
"summary": "SUSE Bug 820973 for CVE-2013-2487",
"url": "https://bugzilla.suse.com/820973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "important"
}
],
"title": "CVE-2013-2487"
},
{
"cve": "CVE-2013-3555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-3555"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-3555",
"url": "https://www.suse.com/security/cve/CVE-2013-3555"
},
{
"category": "external",
"summary": "SUSE Bug 820566 for CVE-2013-3555",
"url": "https://bugzilla.suse.com/820566"
},
{
"category": "external",
"summary": "SUSE Bug 820973 for CVE-2013-3555",
"url": "https://bugzilla.suse.com/820973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-3555"
},
{
"cve": "CVE-2013-3556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-3556"
}
],
"notes": [
{
"category": "general",
"text": "The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-3556",
"url": "https://www.suse.com/security/cve/CVE-2013-3556"
},
{
"category": "external",
"summary": "SUSE Bug 820566 for CVE-2013-3556",
"url": "https://bugzilla.suse.com/820566"
},
{
"category": "external",
"summary": "SUSE Bug 820973 for CVE-2013-3556",
"url": "https://bugzilla.suse.com/820973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-3556"
},
{
"cve": "CVE-2013-3557",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-3557"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-3557",
"url": "https://www.suse.com/security/cve/CVE-2013-3557"
},
{
"category": "external",
"summary": "SUSE Bug 820566 for CVE-2013-3557",
"url": "https://bugzilla.suse.com/820566"
},
{
"category": "external",
"summary": "SUSE Bug 820973 for CVE-2013-3557",
"url": "https://bugzilla.suse.com/820973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-3557"
},
{
"cve": "CVE-2013-3558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-3558"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-3558",
"url": "https://www.suse.com/security/cve/CVE-2013-3558"
},
{
"category": "external",
"summary": "SUSE Bug 820566 for CVE-2013-3558",
"url": "https://bugzilla.suse.com/820566"
},
{
"category": "external",
"summary": "SUSE Bug 820973 for CVE-2013-3558",
"url": "https://bugzilla.suse.com/820973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-3558"
},
{
"cve": "CVE-2013-3559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-3559"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-3559",
"url": "https://www.suse.com/security/cve/CVE-2013-3559"
},
{
"category": "external",
"summary": "SUSE Bug 820566 for CVE-2013-3559",
"url": "https://bugzilla.suse.com/820566"
},
{
"category": "external",
"summary": "SUSE Bug 820973 for CVE-2013-3559",
"url": "https://bugzilla.suse.com/820973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-3559"
},
{
"cve": "CVE-2013-3560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-3560"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-3560",
"url": "https://www.suse.com/security/cve/CVE-2013-3560"
},
{
"category": "external",
"summary": "SUSE Bug 820566 for CVE-2013-3560",
"url": "https://bugzilla.suse.com/820566"
},
{
"category": "external",
"summary": "SUSE Bug 820973 for CVE-2013-3560",
"url": "https://bugzilla.suse.com/820973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-3560"
},
{
"cve": "CVE-2013-3561",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-3561"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-3561",
"url": "https://www.suse.com/security/cve/CVE-2013-3561"
},
{
"category": "external",
"summary": "SUSE Bug 820566 for CVE-2013-3561",
"url": "https://bugzilla.suse.com/820566"
},
{
"category": "external",
"summary": "SUSE Bug 820973 for CVE-2013-3561",
"url": "https://bugzilla.suse.com/820973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-3561"
},
{
"cve": "CVE-2013-3562",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-3562"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-3562",
"url": "https://www.suse.com/security/cve/CVE-2013-3562"
},
{
"category": "external",
"summary": "SUSE Bug 820566 for CVE-2013-3562",
"url": "https://bugzilla.suse.com/820566"
},
{
"category": "external",
"summary": "SUSE Bug 820973 for CVE-2013-3562",
"url": "https://bugzilla.suse.com/820973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-3562"
},
{
"cve": "CVE-2013-4074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4074"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4074",
"url": "https://www.suse.com/security/cve/CVE-2013-4074"
},
{
"category": "external",
"summary": "SUSE Bug 824900 for CVE-2013-4074",
"url": "https://bugzilla.suse.com/824900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4074"
},
{
"cve": "CVE-2013-4075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4075"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4075",
"url": "https://www.suse.com/security/cve/CVE-2013-4075"
},
{
"category": "external",
"summary": "SUSE Bug 824900 for CVE-2013-4075",
"url": "https://bugzilla.suse.com/824900"
},
{
"category": "external",
"summary": "SUSE Bug 836146 for CVE-2013-4075",
"url": "https://bugzilla.suse.com/836146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4075"
},
{
"cve": "CVE-2013-4076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4076"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4076",
"url": "https://www.suse.com/security/cve/CVE-2013-4076"
},
{
"category": "external",
"summary": "SUSE Bug 824900 for CVE-2013-4076",
"url": "https://bugzilla.suse.com/824900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4076"
},
{
"cve": "CVE-2013-4077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4077"
}
],
"notes": [
{
"category": "general",
"text": "Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4077",
"url": "https://www.suse.com/security/cve/CVE-2013-4077"
},
{
"category": "external",
"summary": "SUSE Bug 824900 for CVE-2013-4077",
"url": "https://bugzilla.suse.com/824900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4077"
},
{
"cve": "CVE-2013-4078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4078"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4078",
"url": "https://www.suse.com/security/cve/CVE-2013-4078"
},
{
"category": "external",
"summary": "SUSE Bug 824900 for CVE-2013-4078",
"url": "https://bugzilla.suse.com/824900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4078"
},
{
"cve": "CVE-2013-4079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4079"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4079",
"url": "https://www.suse.com/security/cve/CVE-2013-4079"
},
{
"category": "external",
"summary": "SUSE Bug 824900 for CVE-2013-4079",
"url": "https://bugzilla.suse.com/824900"
},
{
"category": "external",
"summary": "SUSE Bug 836146 for CVE-2013-4079",
"url": "https://bugzilla.suse.com/836146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4079"
},
{
"cve": "CVE-2013-4080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4080"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4080",
"url": "https://www.suse.com/security/cve/CVE-2013-4080"
},
{
"category": "external",
"summary": "SUSE Bug 824900 for CVE-2013-4080",
"url": "https://bugzilla.suse.com/824900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4080"
},
{
"cve": "CVE-2013-4081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4081"
}
],
"notes": [
{
"category": "general",
"text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4081",
"url": "https://www.suse.com/security/cve/CVE-2013-4081"
},
{
"category": "external",
"summary": "SUSE Bug 824900 for CVE-2013-4081",
"url": "https://bugzilla.suse.com/824900"
},
{
"category": "external",
"summary": "SUSE Bug 836116 for CVE-2013-4081",
"url": "https://bugzilla.suse.com/836116"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4081"
},
{
"cve": "CVE-2013-4082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4082"
}
],
"notes": [
{
"category": "general",
"text": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4082",
"url": "https://www.suse.com/security/cve/CVE-2013-4082"
},
{
"category": "external",
"summary": "SUSE Bug 824900 for CVE-2013-4082",
"url": "https://bugzilla.suse.com/824900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4082"
},
{
"cve": "CVE-2013-4083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4083"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4083",
"url": "https://www.suse.com/security/cve/CVE-2013-4083"
},
{
"category": "external",
"summary": "SUSE Bug 824900 for CVE-2013-4083",
"url": "https://bugzilla.suse.com/824900"
},
{
"category": "external",
"summary": "SUSE Bug 831718 for CVE-2013-4083",
"url": "https://bugzilla.suse.com/831718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4083"
},
{
"cve": "CVE-2013-4929",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4929"
}
],
"notes": [
{
"category": "general",
"text": "The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4929",
"url": "https://www.suse.com/security/cve/CVE-2013-4929"
},
{
"category": "external",
"summary": "SUSE Bug 831718 for CVE-2013-4929",
"url": "https://bugzilla.suse.com/831718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "important"
}
],
"title": "CVE-2013-4929"
},
{
"cve": "CVE-2013-4930",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4930"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4930",
"url": "https://www.suse.com/security/cve/CVE-2013-4930"
},
{
"category": "external",
"summary": "SUSE Bug 831718 for CVE-2013-4930",
"url": "https://bugzilla.suse.com/831718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4930"
},
{
"cve": "CVE-2013-4931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4931"
}
],
"notes": [
{
"category": "general",
"text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4931",
"url": "https://www.suse.com/security/cve/CVE-2013-4931"
},
{
"category": "external",
"summary": "SUSE Bug 831718 for CVE-2013-4931",
"url": "https://bugzilla.suse.com/831718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4931"
},
{
"cve": "CVE-2013-4932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4932"
}
],
"notes": [
{
"category": "general",
"text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4932",
"url": "https://www.suse.com/security/cve/CVE-2013-4932"
},
{
"category": "external",
"summary": "SUSE Bug 831718 for CVE-2013-4932",
"url": "https://bugzilla.suse.com/831718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4932"
},
{
"cve": "CVE-2013-4933",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4933"
}
],
"notes": [
{
"category": "general",
"text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4933",
"url": "https://www.suse.com/security/cve/CVE-2013-4933"
},
{
"category": "external",
"summary": "SUSE Bug 831718 for CVE-2013-4933",
"url": "https://bugzilla.suse.com/831718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4933"
},
{
"cve": "CVE-2013-4934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4934"
}
],
"notes": [
{
"category": "general",
"text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4934",
"url": "https://www.suse.com/security/cve/CVE-2013-4934"
},
{
"category": "external",
"summary": "SUSE Bug 831718 for CVE-2013-4934",
"url": "https://bugzilla.suse.com/831718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4934"
},
{
"cve": "CVE-2013-4935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4935"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4935",
"url": "https://www.suse.com/security/cve/CVE-2013-4935"
},
{
"category": "external",
"summary": "SUSE Bug 831718 for CVE-2013-4935",
"url": "https://bugzilla.suse.com/831718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-4935"
},
{
"cve": "CVE-2013-6336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-6336"
}
],
"notes": [
{
"category": "general",
"text": "The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-6336",
"url": "https://www.suse.com/security/cve/CVE-2013-6336"
},
{
"category": "external",
"summary": "SUSE Bug 848738 for CVE-2013-6336",
"url": "https://bugzilla.suse.com/848738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-6336"
},
{
"cve": "CVE-2013-6337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-6337"
}
],
"notes": [
{
"category": "general",
"text": "Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-6337",
"url": "https://www.suse.com/security/cve/CVE-2013-6337"
},
{
"category": "external",
"summary": "SUSE Bug 848738 for CVE-2013-6337",
"url": "https://bugzilla.suse.com/848738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-6337"
},
{
"cve": "CVE-2013-6338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-6338"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-6338",
"url": "https://www.suse.com/security/cve/CVE-2013-6338"
},
{
"category": "external",
"summary": "SUSE Bug 848738 for CVE-2013-6338",
"url": "https://bugzilla.suse.com/848738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-6338"
},
{
"cve": "CVE-2013-6339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-6339"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-6339",
"url": "https://www.suse.com/security/cve/CVE-2013-6339"
},
{
"category": "external",
"summary": "SUSE Bug 848738 for CVE-2013-6339",
"url": "https://bugzilla.suse.com/848738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-6339"
},
{
"cve": "CVE-2013-6340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-6340"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-6340",
"url": "https://www.suse.com/security/cve/CVE-2013-6340"
},
{
"category": "external",
"summary": "SUSE Bug 848738 for CVE-2013-6340",
"url": "https://bugzilla.suse.com/848738"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-6340"
},
{
"cve": "CVE-2013-7112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-7112"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-7112",
"url": "https://www.suse.com/security/cve/CVE-2013-7112"
},
{
"category": "external",
"summary": "SUSE Bug 856498 for CVE-2013-7112",
"url": "https://bugzilla.suse.com/856498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "important"
}
],
"title": "CVE-2013-7112"
},
{
"cve": "CVE-2013-7113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-7113"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-7113",
"url": "https://www.suse.com/security/cve/CVE-2013-7113"
},
{
"category": "external",
"summary": "SUSE Bug 856495 for CVE-2013-7113",
"url": "https://bugzilla.suse.com/856495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2013-7113"
},
{
"cve": "CVE-2013-7114",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-7114"
}
],
"notes": [
{
"category": "general",
"text": "Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-7114",
"url": "https://www.suse.com/security/cve/CVE-2013-7114"
},
{
"category": "external",
"summary": "SUSE Bug 856496 for CVE-2013-7114",
"url": "https://bugzilla.suse.com/856496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "important"
}
],
"title": "CVE-2013-7114"
},
{
"cve": "CVE-2014-2281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2281"
}
],
"notes": [
{
"category": "general",
"text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2281",
"url": "https://www.suse.com/security/cve/CVE-2014-2281"
},
{
"category": "external",
"summary": "SUSE Bug 867485 for CVE-2014-2281",
"url": "https://bugzilla.suse.com/867485"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-2281"
},
{
"cve": "CVE-2014-2282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2282"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2282",
"url": "https://www.suse.com/security/cve/CVE-2014-2282"
},
{
"category": "external",
"summary": "SUSE Bug 867485 for CVE-2014-2282",
"url": "https://bugzilla.suse.com/867485"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-2282"
},
{
"cve": "CVE-2014-2283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2283"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2283",
"url": "https://www.suse.com/security/cve/CVE-2014-2283"
},
{
"category": "external",
"summary": "SUSE Bug 867485 for CVE-2014-2283",
"url": "https://bugzilla.suse.com/867485"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-2283"
},
{
"cve": "CVE-2014-2299",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2299"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2299",
"url": "https://www.suse.com/security/cve/CVE-2014-2299"
},
{
"category": "external",
"summary": "SUSE Bug 867485 for CVE-2014-2299",
"url": "https://bugzilla.suse.com/867485"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "critical"
}
],
"title": "CVE-2014-2299"
},
{
"cve": "CVE-2014-6421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6421"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6421",
"url": "https://www.suse.com/security/cve/CVE-2014-6421"
},
{
"category": "external",
"summary": "SUSE Bug 897055 for CVE-2014-6421",
"url": "https://bugzilla.suse.com/897055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-6421"
},
{
"cve": "CVE-2014-6422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6422"
}
],
"notes": [
{
"category": "general",
"text": "The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6422",
"url": "https://www.suse.com/security/cve/CVE-2014-6422"
},
{
"category": "external",
"summary": "SUSE Bug 897055 for CVE-2014-6422",
"url": "https://bugzilla.suse.com/897055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-6422"
},
{
"cve": "CVE-2014-6423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6423"
}
],
"notes": [
{
"category": "general",
"text": "The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6423",
"url": "https://www.suse.com/security/cve/CVE-2014-6423"
},
{
"category": "external",
"summary": "SUSE Bug 897055 for CVE-2014-6423",
"url": "https://bugzilla.suse.com/897055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-6423"
},
{
"cve": "CVE-2014-6424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6424"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6424",
"url": "https://www.suse.com/security/cve/CVE-2014-6424"
},
{
"category": "external",
"summary": "SUSE Bug 897055 for CVE-2014-6424",
"url": "https://bugzilla.suse.com/897055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-6424"
},
{
"cve": "CVE-2014-6427",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6427"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6427",
"url": "https://www.suse.com/security/cve/CVE-2014-6427"
},
{
"category": "external",
"summary": "SUSE Bug 897055 for CVE-2014-6427",
"url": "https://bugzilla.suse.com/897055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-6427"
},
{
"cve": "CVE-2014-6428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6428"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6428",
"url": "https://www.suse.com/security/cve/CVE-2014-6428"
},
{
"category": "external",
"summary": "SUSE Bug 897055 for CVE-2014-6428",
"url": "https://bugzilla.suse.com/897055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-6428"
},
{
"cve": "CVE-2014-6429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6429"
}
],
"notes": [
{
"category": "general",
"text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6429",
"url": "https://www.suse.com/security/cve/CVE-2014-6429"
},
{
"category": "external",
"summary": "SUSE Bug 897055 for CVE-2014-6429",
"url": "https://bugzilla.suse.com/897055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-6429"
},
{
"cve": "CVE-2014-6430",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6430"
}
],
"notes": [
{
"category": "general",
"text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6430",
"url": "https://www.suse.com/security/cve/CVE-2014-6430"
},
{
"category": "external",
"summary": "SUSE Bug 897055 for CVE-2014-6430",
"url": "https://bugzilla.suse.com/897055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-6430"
},
{
"cve": "CVE-2014-6431",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6431"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6431",
"url": "https://www.suse.com/security/cve/CVE-2014-6431"
},
{
"category": "external",
"summary": "SUSE Bug 897055 for CVE-2014-6431",
"url": "https://bugzilla.suse.com/897055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-6431"
},
{
"cve": "CVE-2014-6432",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6432"
}
],
"notes": [
{
"category": "general",
"text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6432",
"url": "https://www.suse.com/security/cve/CVE-2014-6432"
},
{
"category": "external",
"summary": "SUSE Bug 897055 for CVE-2014-6432",
"url": "https://bugzilla.suse.com/897055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-6432"
},
{
"cve": "CVE-2014-8710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8710"
}
],
"notes": [
{
"category": "general",
"text": "The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8710",
"url": "https://www.suse.com/security/cve/CVE-2014-8710"
},
{
"category": "external",
"summary": "SUSE Bug 905246 for CVE-2014-8710",
"url": "https://bugzilla.suse.com/905246"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-8710"
},
{
"cve": "CVE-2014-8711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8711"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8711",
"url": "https://www.suse.com/security/cve/CVE-2014-8711"
},
{
"category": "external",
"summary": "SUSE Bug 905245 for CVE-2014-8711",
"url": "https://bugzilla.suse.com/905245"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-8711"
},
{
"cve": "CVE-2014-8712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8712"
}
],
"notes": [
{
"category": "general",
"text": "The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8712",
"url": "https://www.suse.com/security/cve/CVE-2014-8712"
},
{
"category": "external",
"summary": "SUSE Bug 905248 for CVE-2014-8712",
"url": "https://bugzilla.suse.com/905248"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-8712"
},
{
"cve": "CVE-2014-8713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8713"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8713",
"url": "https://www.suse.com/security/cve/CVE-2014-8713"
},
{
"category": "external",
"summary": "SUSE Bug 905248 for CVE-2014-8713",
"url": "https://bugzilla.suse.com/905248"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-8713"
},
{
"cve": "CVE-2014-8714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8714"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8714",
"url": "https://www.suse.com/security/cve/CVE-2014-8714"
},
{
"category": "external",
"summary": "SUSE Bug 905247 for CVE-2014-8714",
"url": "https://bugzilla.suse.com/905247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2014-8714"
},
{
"cve": "CVE-2015-0559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0559"
}
],
"notes": [
{
"category": "general",
"text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0559",
"url": "https://www.suse.com/security/cve/CVE-2015-0559"
},
{
"category": "external",
"summary": "SUSE Bug 912365 for CVE-2015-0559",
"url": "https://bugzilla.suse.com/912365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-0559"
},
{
"cve": "CVE-2015-0560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0560"
}
],
"notes": [
{
"category": "general",
"text": "The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0560",
"url": "https://www.suse.com/security/cve/CVE-2015-0560"
},
{
"category": "external",
"summary": "SUSE Bug 912365 for CVE-2015-0560",
"url": "https://bugzilla.suse.com/912365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-0560"
},
{
"cve": "CVE-2015-0561",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0561"
}
],
"notes": [
{
"category": "general",
"text": "asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0561",
"url": "https://www.suse.com/security/cve/CVE-2015-0561"
},
{
"category": "external",
"summary": "SUSE Bug 912368 for CVE-2015-0561",
"url": "https://bugzilla.suse.com/912368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-0561"
},
{
"cve": "CVE-2015-0562",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0562"
}
],
"notes": [
{
"category": "general",
"text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0562",
"url": "https://www.suse.com/security/cve/CVE-2015-0562"
},
{
"category": "external",
"summary": "SUSE Bug 912369 for CVE-2015-0562",
"url": "https://bugzilla.suse.com/912369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-0562"
},
{
"cve": "CVE-2015-0563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0563"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0563",
"url": "https://www.suse.com/security/cve/CVE-2015-0563"
},
{
"category": "external",
"summary": "SUSE Bug 912370 for CVE-2015-0563",
"url": "https://bugzilla.suse.com/912370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-0563"
},
{
"cve": "CVE-2015-0564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0564"
}
],
"notes": [
{
"category": "general",
"text": "Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0564",
"url": "https://www.suse.com/security/cve/CVE-2015-0564"
},
{
"category": "external",
"summary": "SUSE Bug 912372 for CVE-2015-0564",
"url": "https://bugzilla.suse.com/912372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-0564"
},
{
"cve": "CVE-2015-2188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2188"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2188",
"url": "https://www.suse.com/security/cve/CVE-2015-2188"
},
{
"category": "external",
"summary": "SUSE Bug 920696 for CVE-2015-2188",
"url": "https://bugzilla.suse.com/920696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-2188"
},
{
"cve": "CVE-2015-2189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2189"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2189",
"url": "https://www.suse.com/security/cve/CVE-2015-2189"
},
{
"category": "external",
"summary": "SUSE Bug 920697 for CVE-2015-2189",
"url": "https://bugzilla.suse.com/920697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-2189"
},
{
"cve": "CVE-2015-2191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2191"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2191",
"url": "https://www.suse.com/security/cve/CVE-2015-2191"
},
{
"category": "external",
"summary": "SUSE Bug 920699 for CVE-2015-2191",
"url": "https://bugzilla.suse.com/920699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-2191"
},
{
"cve": "CVE-2015-3811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3811"
}
],
"notes": [
{
"category": "general",
"text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3811",
"url": "https://www.suse.com/security/cve/CVE-2015-3811"
},
{
"category": "external",
"summary": "SUSE Bug 930689 for CVE-2015-3811",
"url": "https://bugzilla.suse.com/930689"
},
{
"category": "external",
"summary": "SUSE Bug 930691 for CVE-2015-3811",
"url": "https://bugzilla.suse.com/930691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-3811"
},
{
"cve": "CVE-2015-3812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3812"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3812",
"url": "https://www.suse.com/security/cve/CVE-2015-3812"
},
{
"category": "external",
"summary": "SUSE Bug 930689 for CVE-2015-3812",
"url": "https://bugzilla.suse.com/930689"
},
{
"category": "external",
"summary": "SUSE Bug 930691 for CVE-2015-3812",
"url": "https://bugzilla.suse.com/930691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-3812"
},
{
"cve": "CVE-2015-3814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3814"
}
],
"notes": [
{
"category": "general",
"text": "The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3814",
"url": "https://www.suse.com/security/cve/CVE-2015-3814"
},
{
"category": "external",
"summary": "SUSE Bug 930689 for CVE-2015-3814",
"url": "https://bugzilla.suse.com/930689"
},
{
"category": "external",
"summary": "SUSE Bug 930691 for CVE-2015-3814",
"url": "https://bugzilla.suse.com/930691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2014-11-14T12:53:20Z",
"details": "moderate"
}
],
"title": "CVE-2015-3814"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…