SUSE-SU-2015:0653-1

Vulnerability from csaf_suse - Published: 2014-11-14 12:53 - Updated: 2014-11-14 12:53
Summary
Security update for wireshark
Severity
Moderate
Notes
Title of the patch: Security update for wireshark
Description of the patch: wireshark has been updated to version 1.10.11 to fix five security issues. These security issues have been fixed: * SigComp UDVM buffer overflow (CVE-2014-8710). * AMQP dissector crash (CVE-2014-8711). * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713). * TN5250 infinite loops (CVE-2014-8714). This non-security issue has been fixed: * enable zlib (bnc#899303). Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html <https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html> Security Issues: * CVE-2014-8711 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711> * CVE-2014-8710 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710> * CVE-2014-8714 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714> * CVE-2014-8712 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712> * CVE-2014-8713 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713>
Patchnames: sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/813217 self
https://bugzilla.suse.com/816517 self
https://bugzilla.suse.com/816887 self
https://bugzilla.suse.com/820973 self
https://bugzilla.suse.com/824900 self
https://bugzilla.suse.com/831718 self
https://bugzilla.suse.com/839607 self
https://bugzilla.suse.com/848738 self
https://bugzilla.suse.com/855980 self
https://bugzilla.suse.com/856495 self
https://bugzilla.suse.com/856496 self
https://bugzilla.suse.com/856498 self
https://bugzilla.suse.com/867485 self
https://bugzilla.suse.com/889854 self
https://bugzilla.suse.com/889899 self
https://bugzilla.suse.com/889900 self
https://bugzilla.suse.com/889901 self
https://bugzilla.suse.com/889906 self
https://bugzilla.suse.com/897055 self
https://bugzilla.suse.com/899303 self
https://bugzilla.suse.com/905245 self
https://bugzilla.suse.com/905246 self
https://bugzilla.suse.com/905247 self
https://bugzilla.suse.com/905248 self
https://bugzilla.suse.com/912365 self
https://bugzilla.suse.com/912368 self
https://bugzilla.suse.com/912369 self
https://bugzilla.suse.com/912370 self
https://bugzilla.suse.com/912372 self
https://bugzilla.suse.com/920696 self
https://bugzilla.suse.com/920697 self
https://bugzilla.suse.com/920699 self
https://bugzilla.suse.com/930691 self
https://www.suse.com/security/cve/CVE-2013-2486/ self
https://www.suse.com/security/cve/CVE-2013-2487/ self
https://www.suse.com/security/cve/CVE-2013-3555/ self
https://www.suse.com/security/cve/CVE-2013-3556/ self
https://www.suse.com/security/cve/CVE-2013-3557/ self
https://www.suse.com/security/cve/CVE-2013-3558/ self
https://www.suse.com/security/cve/CVE-2013-3559/ self
https://www.suse.com/security/cve/CVE-2013-3560/ self
https://www.suse.com/security/cve/CVE-2013-3561/ self
https://www.suse.com/security/cve/CVE-2013-3562/ self
https://www.suse.com/security/cve/CVE-2013-4074/ self
https://www.suse.com/security/cve/CVE-2013-4075/ self
https://www.suse.com/security/cve/CVE-2013-4076/ self
https://www.suse.com/security/cve/CVE-2013-4077/ self
https://www.suse.com/security/cve/CVE-2013-4078/ self
https://www.suse.com/security/cve/CVE-2013-4079/ self
https://www.suse.com/security/cve/CVE-2013-4080/ self
https://www.suse.com/security/cve/CVE-2013-4081/ self
https://www.suse.com/security/cve/CVE-2013-4082/ self
https://www.suse.com/security/cve/CVE-2013-4083/ self
https://www.suse.com/security/cve/CVE-2013-4929/ self
https://www.suse.com/security/cve/CVE-2013-4930/ self
https://www.suse.com/security/cve/CVE-2013-4931/ self
https://www.suse.com/security/cve/CVE-2013-4932/ self
https://www.suse.com/security/cve/CVE-2013-4933/ self
https://www.suse.com/security/cve/CVE-2013-4934/ self
https://www.suse.com/security/cve/CVE-2013-4935/ self
https://www.suse.com/security/cve/CVE-2013-6336/ self
https://www.suse.com/security/cve/CVE-2013-6337/ self
https://www.suse.com/security/cve/CVE-2013-6338/ self
https://www.suse.com/security/cve/CVE-2013-6339/ self
https://www.suse.com/security/cve/CVE-2013-6340/ self
https://www.suse.com/security/cve/CVE-2013-7112/ self
https://www.suse.com/security/cve/CVE-2013-7113/ self
https://www.suse.com/security/cve/CVE-2013-7114/ self
https://www.suse.com/security/cve/CVE-2014-2281/ self
https://www.suse.com/security/cve/CVE-2014-2282/ self
https://www.suse.com/security/cve/CVE-2014-2283/ self
https://www.suse.com/security/cve/CVE-2014-2299/ self
https://www.suse.com/security/cve/CVE-2014-6421/ self
https://www.suse.com/security/cve/CVE-2014-6422/ self
https://www.suse.com/security/cve/CVE-2014-6423/ self
https://www.suse.com/security/cve/CVE-2014-6424/ self
https://www.suse.com/security/cve/CVE-2014-6427/ self
https://www.suse.com/security/cve/CVE-2014-6428/ self
https://www.suse.com/security/cve/CVE-2014-6429/ self
https://www.suse.com/security/cve/CVE-2014-6430/ self
https://www.suse.com/security/cve/CVE-2014-6431/ self
https://www.suse.com/security/cve/CVE-2014-6432/ self
https://www.suse.com/security/cve/CVE-2014-8710/ self
https://www.suse.com/security/cve/CVE-2014-8711/ self
https://www.suse.com/security/cve/CVE-2014-8712/ self
https://www.suse.com/security/cve/CVE-2014-8713/ self
https://www.suse.com/security/cve/CVE-2014-8714/ self
https://www.suse.com/security/cve/CVE-2015-0559/ self
https://www.suse.com/security/cve/CVE-2015-0560/ self
https://www.suse.com/security/cve/CVE-2015-0561/ self
https://www.suse.com/security/cve/CVE-2015-0562/ self
https://www.suse.com/security/cve/CVE-2015-0563/ self
https://www.suse.com/security/cve/CVE-2015-0564/ self
https://www.suse.com/security/cve/CVE-2015-2188/ self
https://www.suse.com/security/cve/CVE-2015-2189/ self
https://www.suse.com/security/cve/CVE-2015-2191/ self
https://www.suse.com/security/cve/CVE-2015-3811/ self
https://www.suse.com/security/cve/CVE-2015-3812/ self
https://www.suse.com/security/cve/CVE-2015-3814/ self
https://www.suse.com/security/cve/CVE-2013-2486 external
https://bugzilla.suse.com/807942 external
https://bugzilla.suse.com/820566 external
https://bugzilla.suse.com/820973 external
https://www.suse.com/security/cve/CVE-2013-2487 external
https://bugzilla.suse.com/807942 external
https://bugzilla.suse.com/820566 external
https://bugzilla.suse.com/820973 external
https://www.suse.com/security/cve/CVE-2013-3555 external
https://bugzilla.suse.com/820566 external
https://bugzilla.suse.com/820973 external
https://www.suse.com/security/cve/CVE-2013-3556 external
https://bugzilla.suse.com/820566 external
https://bugzilla.suse.com/820973 external
https://www.suse.com/security/cve/CVE-2013-3557 external
https://bugzilla.suse.com/820566 external
https://bugzilla.suse.com/820973 external
https://www.suse.com/security/cve/CVE-2013-3558 external
https://bugzilla.suse.com/820566 external
https://bugzilla.suse.com/820973 external
https://www.suse.com/security/cve/CVE-2013-3559 external
https://bugzilla.suse.com/820566 external
https://bugzilla.suse.com/820973 external
https://www.suse.com/security/cve/CVE-2013-3560 external
https://bugzilla.suse.com/820566 external
https://bugzilla.suse.com/820973 external
https://www.suse.com/security/cve/CVE-2013-3561 external
https://bugzilla.suse.com/820566 external
https://bugzilla.suse.com/820973 external
https://www.suse.com/security/cve/CVE-2013-3562 external
https://bugzilla.suse.com/820566 external
https://bugzilla.suse.com/820973 external
https://www.suse.com/security/cve/CVE-2013-4074 external
https://bugzilla.suse.com/824900 external
https://www.suse.com/security/cve/CVE-2013-4075 external
https://bugzilla.suse.com/824900 external
https://bugzilla.suse.com/836146 external
https://www.suse.com/security/cve/CVE-2013-4076 external
https://bugzilla.suse.com/824900 external
https://www.suse.com/security/cve/CVE-2013-4077 external
https://bugzilla.suse.com/824900 external
https://www.suse.com/security/cve/CVE-2013-4078 external
https://bugzilla.suse.com/824900 external
https://www.suse.com/security/cve/CVE-2013-4079 external
https://bugzilla.suse.com/824900 external
https://bugzilla.suse.com/836146 external
https://www.suse.com/security/cve/CVE-2013-4080 external
https://bugzilla.suse.com/824900 external
https://www.suse.com/security/cve/CVE-2013-4081 external
https://bugzilla.suse.com/824900 external
https://bugzilla.suse.com/836116 external
https://www.suse.com/security/cve/CVE-2013-4082 external
https://bugzilla.suse.com/824900 external
https://www.suse.com/security/cve/CVE-2013-4083 external
https://bugzilla.suse.com/824900 external
https://bugzilla.suse.com/831718 external
https://www.suse.com/security/cve/CVE-2013-4929 external
https://bugzilla.suse.com/831718 external
https://www.suse.com/security/cve/CVE-2013-4930 external
https://bugzilla.suse.com/831718 external
https://www.suse.com/security/cve/CVE-2013-4931 external
https://bugzilla.suse.com/831718 external
https://www.suse.com/security/cve/CVE-2013-4932 external
https://bugzilla.suse.com/831718 external
https://www.suse.com/security/cve/CVE-2013-4933 external
https://bugzilla.suse.com/831718 external
https://www.suse.com/security/cve/CVE-2013-4934 external
https://bugzilla.suse.com/831718 external
https://www.suse.com/security/cve/CVE-2013-4935 external
https://bugzilla.suse.com/831718 external
https://www.suse.com/security/cve/CVE-2013-6336 external
https://bugzilla.suse.com/848738 external
https://www.suse.com/security/cve/CVE-2013-6337 external
https://bugzilla.suse.com/848738 external
https://www.suse.com/security/cve/CVE-2013-6338 external
https://bugzilla.suse.com/848738 external
https://www.suse.com/security/cve/CVE-2013-6339 external
https://bugzilla.suse.com/848738 external
https://www.suse.com/security/cve/CVE-2013-6340 external
https://bugzilla.suse.com/848738 external
https://www.suse.com/security/cve/CVE-2013-7112 external
https://bugzilla.suse.com/856498 external
https://www.suse.com/security/cve/CVE-2013-7113 external
https://bugzilla.suse.com/856495 external
https://www.suse.com/security/cve/CVE-2013-7114 external
https://bugzilla.suse.com/856496 external
https://www.suse.com/security/cve/CVE-2014-2281 external
https://bugzilla.suse.com/867485 external
https://www.suse.com/security/cve/CVE-2014-2282 external
https://bugzilla.suse.com/867485 external
https://www.suse.com/security/cve/CVE-2014-2283 external
https://bugzilla.suse.com/867485 external
https://www.suse.com/security/cve/CVE-2014-2299 external
https://bugzilla.suse.com/867485 external
https://www.suse.com/security/cve/CVE-2014-6421 external
https://bugzilla.suse.com/897055 external
https://www.suse.com/security/cve/CVE-2014-6422 external
https://bugzilla.suse.com/897055 external
https://www.suse.com/security/cve/CVE-2014-6423 external
https://bugzilla.suse.com/897055 external
https://www.suse.com/security/cve/CVE-2014-6424 external
https://bugzilla.suse.com/897055 external
https://www.suse.com/security/cve/CVE-2014-6427 external
https://bugzilla.suse.com/897055 external
https://www.suse.com/security/cve/CVE-2014-6428 external
https://bugzilla.suse.com/897055 external
https://www.suse.com/security/cve/CVE-2014-6429 external
https://bugzilla.suse.com/897055 external
https://www.suse.com/security/cve/CVE-2014-6430 external
https://bugzilla.suse.com/897055 external
https://www.suse.com/security/cve/CVE-2014-6431 external
https://bugzilla.suse.com/897055 external
https://www.suse.com/security/cve/CVE-2014-6432 external
https://bugzilla.suse.com/897055 external
https://www.suse.com/security/cve/CVE-2014-8710 external
https://bugzilla.suse.com/905246 external
https://www.suse.com/security/cve/CVE-2014-8711 external
https://bugzilla.suse.com/905245 external
https://www.suse.com/security/cve/CVE-2014-8712 external
https://bugzilla.suse.com/905248 external
https://www.suse.com/security/cve/CVE-2014-8713 external
https://bugzilla.suse.com/905248 external
https://www.suse.com/security/cve/CVE-2014-8714 external
https://bugzilla.suse.com/905247 external
https://www.suse.com/security/cve/CVE-2015-0559 external
https://bugzilla.suse.com/912365 external
https://www.suse.com/security/cve/CVE-2015-0560 external
https://bugzilla.suse.com/912365 external
https://www.suse.com/security/cve/CVE-2015-0561 external
https://bugzilla.suse.com/912368 external
https://www.suse.com/security/cve/CVE-2015-0562 external
https://bugzilla.suse.com/912369 external
https://www.suse.com/security/cve/CVE-2015-0563 external
https://bugzilla.suse.com/912370 external
https://www.suse.com/security/cve/CVE-2015-0564 external
https://bugzilla.suse.com/912372 external
https://www.suse.com/security/cve/CVE-2015-2188 external
https://bugzilla.suse.com/920696 external
https://www.suse.com/security/cve/CVE-2015-2189 external
https://bugzilla.suse.com/920697 external
https://www.suse.com/security/cve/CVE-2015-2191 external
https://bugzilla.suse.com/920699 external
https://www.suse.com/security/cve/CVE-2015-3811 external
https://bugzilla.suse.com/930689 external
https://bugzilla.suse.com/930691 external
https://www.suse.com/security/cve/CVE-2015-3812 external
https://bugzilla.suse.com/930689 external
https://bugzilla.suse.com/930691 external
https://www.suse.com/security/cve/CVE-2015-3814 external
https://bugzilla.suse.com/930689 external
https://bugzilla.suse.com/930691 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for wireshark",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nwireshark has been updated to version 1.10.11 to fix five security issues.\n\nThese security issues have been fixed:\n\n    * SigComp UDVM buffer overflow (CVE-2014-8710).\n    * AMQP dissector crash (CVE-2014-8711).\n    * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).\n    * TN5250 infinite loops (CVE-2014-8714).\n\nThis non-security issue has been fixed:\n\n    * enable zlib (bnc#899303).\n\nFurther bug fixes and updated protocol support as listed in:\n\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\n\u003chttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\u003e\n\nSecurity Issues:\n\n    * CVE-2014-8711\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711\u003e\n    * CVE-2014-8710\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710\u003e\n    * CVE-2014-8714\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714\u003e\n    * CVE-2014-8712\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712\u003e\n    * CVE-2014-8713\n      \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713\u003e\n\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0653-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2015:0653-1",
        "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150653-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2015:0653-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 813217",
        "url": "https://bugzilla.suse.com/813217"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816517",
        "url": "https://bugzilla.suse.com/816517"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816887",
        "url": "https://bugzilla.suse.com/816887"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 820973",
        "url": "https://bugzilla.suse.com/820973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 824900",
        "url": "https://bugzilla.suse.com/824900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 831718",
        "url": "https://bugzilla.suse.com/831718"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 839607",
        "url": "https://bugzilla.suse.com/839607"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 848738",
        "url": "https://bugzilla.suse.com/848738"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 855980",
        "url": "https://bugzilla.suse.com/855980"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 856495",
        "url": "https://bugzilla.suse.com/856495"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 856496",
        "url": "https://bugzilla.suse.com/856496"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 856498",
        "url": "https://bugzilla.suse.com/856498"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 867485",
        "url": "https://bugzilla.suse.com/867485"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889854",
        "url": "https://bugzilla.suse.com/889854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889899",
        "url": "https://bugzilla.suse.com/889899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889900",
        "url": "https://bugzilla.suse.com/889900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889901",
        "url": "https://bugzilla.suse.com/889901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 889906",
        "url": "https://bugzilla.suse.com/889906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 897055",
        "url": "https://bugzilla.suse.com/897055"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 899303",
        "url": "https://bugzilla.suse.com/899303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 905245",
        "url": "https://bugzilla.suse.com/905245"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 905246",
        "url": "https://bugzilla.suse.com/905246"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 905247",
        "url": "https://bugzilla.suse.com/905247"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 905248",
        "url": "https://bugzilla.suse.com/905248"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 912365",
        "url": "https://bugzilla.suse.com/912365"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 912368",
        "url": "https://bugzilla.suse.com/912368"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 912369",
        "url": "https://bugzilla.suse.com/912369"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 912370",
        "url": "https://bugzilla.suse.com/912370"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 912372",
        "url": "https://bugzilla.suse.com/912372"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 920696",
        "url": "https://bugzilla.suse.com/920696"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 920697",
        "url": "https://bugzilla.suse.com/920697"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 920699",
        "url": "https://bugzilla.suse.com/920699"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 930691",
        "url": "https://bugzilla.suse.com/930691"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2486 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2486/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2487 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2487/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-3555 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-3555/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-3556 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-3556/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-3557 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-3557/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-3558 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-3558/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-3559 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-3559/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-3560 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-3560/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-3561 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-3561/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-3562 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-3562/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4074 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4075 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4075/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4076 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4077 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4077/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4078 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4078/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4079 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4079/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4080 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4081 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4082 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4082/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4083 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4083/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4929 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4929/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4930 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4930/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4931 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4931/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4932 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4932/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4933 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4933/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4934 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4934/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-4935 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-4935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6336 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6336/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6337 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6337/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6338 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6338/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6339 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6339/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-6340 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-6340/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-7112 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-7112/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-7113 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-7113/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-7114 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-7114/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-2281 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-2281/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-2282 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-2282/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-2283 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-2283/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-2299 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-2299/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6421 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6421/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6422 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6422/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6423 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6423/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6424 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6424/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6427 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6427/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6428 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6429 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6429/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6430 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6430/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6431 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6431/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-6432 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-6432/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8710 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8710/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8711 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8711/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8712 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8712/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8713 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8713/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-8714 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-8714/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0559 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0559/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0560 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0560/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0561 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0561/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0562 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0562/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0563 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0563/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0564 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0564/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2188 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2189 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2189/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-2191 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-2191/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-3811 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-3811/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-3812 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-3812/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-3814 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-3814/"
      }
    ],
    "title": "Security update for wireshark",
    "tracking": {
      "current_release_date": "2014-11-14T12:53:20Z",
      "generator": {
        "date": "2014-11-14T12:53:20Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2015:0653-1",
      "initial_release_date": "2014-11-14T12:53:20Z",
      "revision_history": [
        {
          "date": "2014-11-14T12:53:20Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-1.10.11-0.2.1.i586",
                "product": {
                  "name": "wireshark-1.10.11-0.2.1.i586",
                  "product_id": "wireshark-1.10.11-0.2.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-devel-1.10.11-0.2.1.i586",
                "product": {
                  "name": "wireshark-devel-1.10.11-0.2.1.i586",
                  "product_id": "wireshark-devel-1.10.11-0.2.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-devel-1.10.11-0.2.1.ia64",
                "product": {
                  "name": "wireshark-devel-1.10.11-0.2.1.ia64",
                  "product_id": "wireshark-devel-1.10.11-0.2.1.ia64"
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-1.10.11-0.2.1.ia64",
                "product": {
                  "name": "wireshark-1.10.11-0.2.1.ia64",
                  "product_id": "wireshark-1.10.11-0.2.1.ia64"
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-devel-1.10.11-0.2.1.ppc64",
                "product": {
                  "name": "wireshark-devel-1.10.11-0.2.1.ppc64",
                  "product_id": "wireshark-devel-1.10.11-0.2.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-1.10.11-0.2.1.ppc64",
                "product": {
                  "name": "wireshark-1.10.11-0.2.1.ppc64",
                  "product_id": "wireshark-1.10.11-0.2.1.ppc64"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-devel-1.10.11-0.2.1.s390x",
                "product": {
                  "name": "wireshark-devel-1.10.11-0.2.1.s390x",
                  "product_id": "wireshark-devel-1.10.11-0.2.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-1.10.11-0.2.1.s390x",
                "product": {
                  "name": "wireshark-1.10.11-0.2.1.s390x",
                  "product_id": "wireshark-1.10.11-0.2.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wireshark-1.10.11-0.2.1.x86_64",
                "product": {
                  "name": "wireshark-1.10.11-0.2.1.x86_64",
                  "product_id": "wireshark-1.10.11-0.2.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "wireshark-devel-1.10.11-0.2.1.x86_64",
                "product": {
                  "name": "wireshark-devel-1.10.11-0.2.1.x86_64",
                  "product_id": "wireshark-devel-1.10.11-0.2.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 11 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 11 SP3",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:suse:sle-sdk:11:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Desktop 11 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Desktop 11 SP3",
                  "product_id": "SUSE Linux Enterprise Desktop 11 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_sled:11:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP3",
                  "product_id": "SUSE Linux Enterprise Server 11 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_sles:11:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
                  "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:11:sp3:teradata"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:11:sp3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-devel-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586"
        },
        "product_reference": "wireshark-devel-1.10.11-0.2.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-devel-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64"
        },
        "product_reference": "wireshark-devel-1.10.11-0.2.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-devel-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64"
        },
        "product_reference": "wireshark-devel-1.10.11-0.2.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-devel-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x"
        },
        "product_reference": "wireshark-devel-1.10.11-0.2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-devel-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        },
        "product_reference": "wireshark-devel-1.10.11-0.2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3",
          "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3",
          "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3",
          "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3",
          "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3",
          "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64"
        },
        "product_reference": "wireshark-1.10.11-0.2.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2013-2486",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2486"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2486",
          "url": "https://www.suse.com/security/cve/CVE-2013-2486"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 807942 for CVE-2013-2486",
          "url": "https://bugzilla.suse.com/807942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820566 for CVE-2013-2486",
          "url": "https://bugzilla.suse.com/820566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820973 for CVE-2013-2486",
          "url": "https://bugzilla.suse.com/820973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-2486"
    },
    {
      "cve": "CVE-2013-2487",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2487"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2487",
          "url": "https://www.suse.com/security/cve/CVE-2013-2487"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 807942 for CVE-2013-2487",
          "url": "https://bugzilla.suse.com/807942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820566 for CVE-2013-2487",
          "url": "https://bugzilla.suse.com/820566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820973 for CVE-2013-2487",
          "url": "https://bugzilla.suse.com/820973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-2487"
    },
    {
      "cve": "CVE-2013-3555",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-3555"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-3555",
          "url": "https://www.suse.com/security/cve/CVE-2013-3555"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820566 for CVE-2013-3555",
          "url": "https://bugzilla.suse.com/820566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820973 for CVE-2013-3555",
          "url": "https://bugzilla.suse.com/820973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-3555"
    },
    {
      "cve": "CVE-2013-3556",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-3556"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-3556",
          "url": "https://www.suse.com/security/cve/CVE-2013-3556"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820566 for CVE-2013-3556",
          "url": "https://bugzilla.suse.com/820566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820973 for CVE-2013-3556",
          "url": "https://bugzilla.suse.com/820973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-3556"
    },
    {
      "cve": "CVE-2013-3557",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-3557"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-3557",
          "url": "https://www.suse.com/security/cve/CVE-2013-3557"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820566 for CVE-2013-3557",
          "url": "https://bugzilla.suse.com/820566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820973 for CVE-2013-3557",
          "url": "https://bugzilla.suse.com/820973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-3557"
    },
    {
      "cve": "CVE-2013-3558",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-3558"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-3558",
          "url": "https://www.suse.com/security/cve/CVE-2013-3558"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820566 for CVE-2013-3558",
          "url": "https://bugzilla.suse.com/820566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820973 for CVE-2013-3558",
          "url": "https://bugzilla.suse.com/820973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-3558"
    },
    {
      "cve": "CVE-2013-3559",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-3559"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-3559",
          "url": "https://www.suse.com/security/cve/CVE-2013-3559"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820566 for CVE-2013-3559",
          "url": "https://bugzilla.suse.com/820566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820973 for CVE-2013-3559",
          "url": "https://bugzilla.suse.com/820973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-3559"
    },
    {
      "cve": "CVE-2013-3560",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-3560"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-3560",
          "url": "https://www.suse.com/security/cve/CVE-2013-3560"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820566 for CVE-2013-3560",
          "url": "https://bugzilla.suse.com/820566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820973 for CVE-2013-3560",
          "url": "https://bugzilla.suse.com/820973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-3560"
    },
    {
      "cve": "CVE-2013-3561",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-3561"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-3561",
          "url": "https://www.suse.com/security/cve/CVE-2013-3561"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820566 for CVE-2013-3561",
          "url": "https://bugzilla.suse.com/820566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820973 for CVE-2013-3561",
          "url": "https://bugzilla.suse.com/820973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-3561"
    },
    {
      "cve": "CVE-2013-3562",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-3562"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-3562",
          "url": "https://www.suse.com/security/cve/CVE-2013-3562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820566 for CVE-2013-3562",
          "url": "https://bugzilla.suse.com/820566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 820973 for CVE-2013-3562",
          "url": "https://bugzilla.suse.com/820973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-3562"
    },
    {
      "cve": "CVE-2013-4074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4074",
          "url": "https://www.suse.com/security/cve/CVE-2013-4074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824900 for CVE-2013-4074",
          "url": "https://bugzilla.suse.com/824900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4074"
    },
    {
      "cve": "CVE-2013-4075",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4075"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4075",
          "url": "https://www.suse.com/security/cve/CVE-2013-4075"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824900 for CVE-2013-4075",
          "url": "https://bugzilla.suse.com/824900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 836146 for CVE-2013-4075",
          "url": "https://bugzilla.suse.com/836146"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4075"
    },
    {
      "cve": "CVE-2013-4076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4076",
          "url": "https://www.suse.com/security/cve/CVE-2013-4076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824900 for CVE-2013-4076",
          "url": "https://bugzilla.suse.com/824900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4076"
    },
    {
      "cve": "CVE-2013-4077",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4077"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4077",
          "url": "https://www.suse.com/security/cve/CVE-2013-4077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824900 for CVE-2013-4077",
          "url": "https://bugzilla.suse.com/824900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4077"
    },
    {
      "cve": "CVE-2013-4078",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4078"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4078",
          "url": "https://www.suse.com/security/cve/CVE-2013-4078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824900 for CVE-2013-4078",
          "url": "https://bugzilla.suse.com/824900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4078"
    },
    {
      "cve": "CVE-2013-4079",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4079"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4079",
          "url": "https://www.suse.com/security/cve/CVE-2013-4079"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824900 for CVE-2013-4079",
          "url": "https://bugzilla.suse.com/824900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 836146 for CVE-2013-4079",
          "url": "https://bugzilla.suse.com/836146"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4079"
    },
    {
      "cve": "CVE-2013-4080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4080",
          "url": "https://www.suse.com/security/cve/CVE-2013-4080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824900 for CVE-2013-4080",
          "url": "https://bugzilla.suse.com/824900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4080"
    },
    {
      "cve": "CVE-2013-4081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4081",
          "url": "https://www.suse.com/security/cve/CVE-2013-4081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824900 for CVE-2013-4081",
          "url": "https://bugzilla.suse.com/824900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 836116 for CVE-2013-4081",
          "url": "https://bugzilla.suse.com/836116"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4081"
    },
    {
      "cve": "CVE-2013-4082",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4082"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4082",
          "url": "https://www.suse.com/security/cve/CVE-2013-4082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824900 for CVE-2013-4082",
          "url": "https://bugzilla.suse.com/824900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4082"
    },
    {
      "cve": "CVE-2013-4083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4083",
          "url": "https://www.suse.com/security/cve/CVE-2013-4083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 824900 for CVE-2013-4083",
          "url": "https://bugzilla.suse.com/824900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 831718 for CVE-2013-4083",
          "url": "https://bugzilla.suse.com/831718"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4083"
    },
    {
      "cve": "CVE-2013-4929",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4929"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4929",
          "url": "https://www.suse.com/security/cve/CVE-2013-4929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 831718 for CVE-2013-4929",
          "url": "https://bugzilla.suse.com/831718"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-4929"
    },
    {
      "cve": "CVE-2013-4930",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4930"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4930",
          "url": "https://www.suse.com/security/cve/CVE-2013-4930"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 831718 for CVE-2013-4930",
          "url": "https://bugzilla.suse.com/831718"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4930"
    },
    {
      "cve": "CVE-2013-4931",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4931"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4931",
          "url": "https://www.suse.com/security/cve/CVE-2013-4931"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 831718 for CVE-2013-4931",
          "url": "https://bugzilla.suse.com/831718"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4931"
    },
    {
      "cve": "CVE-2013-4932",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4932"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4932",
          "url": "https://www.suse.com/security/cve/CVE-2013-4932"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 831718 for CVE-2013-4932",
          "url": "https://bugzilla.suse.com/831718"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4932"
    },
    {
      "cve": "CVE-2013-4933",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4933"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4933",
          "url": "https://www.suse.com/security/cve/CVE-2013-4933"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 831718 for CVE-2013-4933",
          "url": "https://bugzilla.suse.com/831718"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4933"
    },
    {
      "cve": "CVE-2013-4934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4934",
          "url": "https://www.suse.com/security/cve/CVE-2013-4934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 831718 for CVE-2013-4934",
          "url": "https://bugzilla.suse.com/831718"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4934"
    },
    {
      "cve": "CVE-2013-4935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-4935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-4935",
          "url": "https://www.suse.com/security/cve/CVE-2013-4935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 831718 for CVE-2013-4935",
          "url": "https://bugzilla.suse.com/831718"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-4935"
    },
    {
      "cve": "CVE-2013-6336",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6336"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6336",
          "url": "https://www.suse.com/security/cve/CVE-2013-6336"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 848738 for CVE-2013-6336",
          "url": "https://bugzilla.suse.com/848738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6336"
    },
    {
      "cve": "CVE-2013-6337",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6337"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6337",
          "url": "https://www.suse.com/security/cve/CVE-2013-6337"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 848738 for CVE-2013-6337",
          "url": "https://bugzilla.suse.com/848738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6337"
    },
    {
      "cve": "CVE-2013-6338",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6338"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6338",
          "url": "https://www.suse.com/security/cve/CVE-2013-6338"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 848738 for CVE-2013-6338",
          "url": "https://bugzilla.suse.com/848738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6338"
    },
    {
      "cve": "CVE-2013-6339",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6339"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6339",
          "url": "https://www.suse.com/security/cve/CVE-2013-6339"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 848738 for CVE-2013-6339",
          "url": "https://bugzilla.suse.com/848738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6339"
    },
    {
      "cve": "CVE-2013-6340",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-6340"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-6340",
          "url": "https://www.suse.com/security/cve/CVE-2013-6340"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 848738 for CVE-2013-6340",
          "url": "https://bugzilla.suse.com/848738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-6340"
    },
    {
      "cve": "CVE-2013-7112",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-7112"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-7112",
          "url": "https://www.suse.com/security/cve/CVE-2013-7112"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 856498 for CVE-2013-7112",
          "url": "https://bugzilla.suse.com/856498"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-7112"
    },
    {
      "cve": "CVE-2013-7113",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-7113"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-7113",
          "url": "https://www.suse.com/security/cve/CVE-2013-7113"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 856495 for CVE-2013-7113",
          "url": "https://bugzilla.suse.com/856495"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-7113"
    },
    {
      "cve": "CVE-2013-7114",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-7114"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-7114",
          "url": "https://www.suse.com/security/cve/CVE-2013-7114"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 856496 for CVE-2013-7114",
          "url": "https://bugzilla.suse.com/856496"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2013-7114"
    },
    {
      "cve": "CVE-2014-2281",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-2281"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-2281",
          "url": "https://www.suse.com/security/cve/CVE-2014-2281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 867485 for CVE-2014-2281",
          "url": "https://bugzilla.suse.com/867485"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-2281"
    },
    {
      "cve": "CVE-2014-2282",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-2282"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-2282",
          "url": "https://www.suse.com/security/cve/CVE-2014-2282"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 867485 for CVE-2014-2282",
          "url": "https://bugzilla.suse.com/867485"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-2282"
    },
    {
      "cve": "CVE-2014-2283",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-2283"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-2283",
          "url": "https://www.suse.com/security/cve/CVE-2014-2283"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 867485 for CVE-2014-2283",
          "url": "https://bugzilla.suse.com/867485"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-2283"
    },
    {
      "cve": "CVE-2014-2299",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-2299"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-2299",
          "url": "https://www.suse.com/security/cve/CVE-2014-2299"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 867485 for CVE-2014-2299",
          "url": "https://bugzilla.suse.com/867485"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2014-2299"
    },
    {
      "cve": "CVE-2014-6421",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6421"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6421",
          "url": "https://www.suse.com/security/cve/CVE-2014-6421"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 897055 for CVE-2014-6421",
          "url": "https://bugzilla.suse.com/897055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-6421"
    },
    {
      "cve": "CVE-2014-6422",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6422"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6422",
          "url": "https://www.suse.com/security/cve/CVE-2014-6422"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 897055 for CVE-2014-6422",
          "url": "https://bugzilla.suse.com/897055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-6422"
    },
    {
      "cve": "CVE-2014-6423",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6423"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6423",
          "url": "https://www.suse.com/security/cve/CVE-2014-6423"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 897055 for CVE-2014-6423",
          "url": "https://bugzilla.suse.com/897055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-6423"
    },
    {
      "cve": "CVE-2014-6424",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6424"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6424",
          "url": "https://www.suse.com/security/cve/CVE-2014-6424"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 897055 for CVE-2014-6424",
          "url": "https://bugzilla.suse.com/897055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-6424"
    },
    {
      "cve": "CVE-2014-6427",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6427"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6427",
          "url": "https://www.suse.com/security/cve/CVE-2014-6427"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 897055 for CVE-2014-6427",
          "url": "https://bugzilla.suse.com/897055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-6427"
    },
    {
      "cve": "CVE-2014-6428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6428",
          "url": "https://www.suse.com/security/cve/CVE-2014-6428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 897055 for CVE-2014-6428",
          "url": "https://bugzilla.suse.com/897055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-6428"
    },
    {
      "cve": "CVE-2014-6429",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6429"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6429",
          "url": "https://www.suse.com/security/cve/CVE-2014-6429"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 897055 for CVE-2014-6429",
          "url": "https://bugzilla.suse.com/897055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-6429"
    },
    {
      "cve": "CVE-2014-6430",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6430"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6430",
          "url": "https://www.suse.com/security/cve/CVE-2014-6430"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 897055 for CVE-2014-6430",
          "url": "https://bugzilla.suse.com/897055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-6430"
    },
    {
      "cve": "CVE-2014-6431",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6431"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6431",
          "url": "https://www.suse.com/security/cve/CVE-2014-6431"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 897055 for CVE-2014-6431",
          "url": "https://bugzilla.suse.com/897055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-6431"
    },
    {
      "cve": "CVE-2014-6432",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-6432"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-6432",
          "url": "https://www.suse.com/security/cve/CVE-2014-6432"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 897055 for CVE-2014-6432",
          "url": "https://bugzilla.suse.com/897055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-6432"
    },
    {
      "cve": "CVE-2014-8710",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8710"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8710",
          "url": "https://www.suse.com/security/cve/CVE-2014-8710"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905246 for CVE-2014-8710",
          "url": "https://bugzilla.suse.com/905246"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-8710"
    },
    {
      "cve": "CVE-2014-8711",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8711"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8711",
          "url": "https://www.suse.com/security/cve/CVE-2014-8711"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905245 for CVE-2014-8711",
          "url": "https://bugzilla.suse.com/905245"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-8711"
    },
    {
      "cve": "CVE-2014-8712",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8712"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8712",
          "url": "https://www.suse.com/security/cve/CVE-2014-8712"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905248 for CVE-2014-8712",
          "url": "https://bugzilla.suse.com/905248"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-8712"
    },
    {
      "cve": "CVE-2014-8713",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8713"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8713",
          "url": "https://www.suse.com/security/cve/CVE-2014-8713"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905248 for CVE-2014-8713",
          "url": "https://bugzilla.suse.com/905248"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-8713"
    },
    {
      "cve": "CVE-2014-8714",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-8714"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-8714",
          "url": "https://www.suse.com/security/cve/CVE-2014-8714"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 905247 for CVE-2014-8714",
          "url": "https://bugzilla.suse.com/905247"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-8714"
    },
    {
      "cve": "CVE-2015-0559",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0559"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0559",
          "url": "https://www.suse.com/security/cve/CVE-2015-0559"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 912365 for CVE-2015-0559",
          "url": "https://bugzilla.suse.com/912365"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-0559"
    },
    {
      "cve": "CVE-2015-0560",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0560"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0560",
          "url": "https://www.suse.com/security/cve/CVE-2015-0560"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 912365 for CVE-2015-0560",
          "url": "https://bugzilla.suse.com/912365"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-0560"
    },
    {
      "cve": "CVE-2015-0561",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0561"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0561",
          "url": "https://www.suse.com/security/cve/CVE-2015-0561"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 912368 for CVE-2015-0561",
          "url": "https://bugzilla.suse.com/912368"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-0561"
    },
    {
      "cve": "CVE-2015-0562",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0562"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0562",
          "url": "https://www.suse.com/security/cve/CVE-2015-0562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 912369 for CVE-2015-0562",
          "url": "https://bugzilla.suse.com/912369"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-0562"
    },
    {
      "cve": "CVE-2015-0563",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0563"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0563",
          "url": "https://www.suse.com/security/cve/CVE-2015-0563"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 912370 for CVE-2015-0563",
          "url": "https://bugzilla.suse.com/912370"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-0563"
    },
    {
      "cve": "CVE-2015-0564",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0564"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0564",
          "url": "https://www.suse.com/security/cve/CVE-2015-0564"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 912372 for CVE-2015-0564",
          "url": "https://bugzilla.suse.com/912372"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-0564"
    },
    {
      "cve": "CVE-2015-2188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2188",
          "url": "https://www.suse.com/security/cve/CVE-2015-2188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 920696 for CVE-2015-2188",
          "url": "https://bugzilla.suse.com/920696"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2188"
    },
    {
      "cve": "CVE-2015-2189",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2189"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2189",
          "url": "https://www.suse.com/security/cve/CVE-2015-2189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 920697 for CVE-2015-2189",
          "url": "https://bugzilla.suse.com/920697"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2189"
    },
    {
      "cve": "CVE-2015-2191",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-2191"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-2191",
          "url": "https://www.suse.com/security/cve/CVE-2015-2191"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 920699 for CVE-2015-2191",
          "url": "https://bugzilla.suse.com/920699"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-2191"
    },
    {
      "cve": "CVE-2015-3811",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-3811"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-3811",
          "url": "https://www.suse.com/security/cve/CVE-2015-3811"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 930689 for CVE-2015-3811",
          "url": "https://bugzilla.suse.com/930689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 930691 for CVE-2015-3811",
          "url": "https://bugzilla.suse.com/930691"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-3811"
    },
    {
      "cve": "CVE-2015-3812",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-3812"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-3812",
          "url": "https://www.suse.com/security/cve/CVE-2015-3812"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 930689 for CVE-2015-3812",
          "url": "https://bugzilla.suse.com/930689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 930691 for CVE-2015-3812",
          "url": "https://bugzilla.suse.com/930691"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-3812"
    },
    {
      "cve": "CVE-2015-3814",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-3814"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-3814",
          "url": "https://www.suse.com/security/cve/CVE-2015-3814"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 930689 for CVE-2015-3814",
          "url": "https://bugzilla.suse.com/930689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 930691 for CVE-2015-3814",
          "url": "https://bugzilla.suse.com/930691"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2014-11-14T12:53:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-3814"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…