var-200902-0885
Vulnerability from variot
Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable. Wireshark is prone to multiple denial-of-service vulnerabilities. Exploiting these issues may allow attackers to crash the application, denying service to legitimate users. Attackers may be able to leverage some of these vulnerabilities to execute arbitrary code, but this has not been confirmed. These issues affect Wireshark 0.99.6 through 1.0.5. If the user is tricked into grabbing malicious packets from the network or opening a malicious packet capture file, it may cause Wireshark to crash. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200906-05
http://security.gentoo.org/
Severity: High Title: Wireshark: Multiple vulnerabilities Date: June 30, 2009 Bugs: #242996, #248425, #258013, #264571, #271062 ID: 200906-05
Synopsis
Multiple vulnerabilities have been discovered in Wireshark which allow for Denial of Service (application crash) or remote code execution.
Background
Wireshark is a versatile network protocol analyzer.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-analyzer/wireshark < 1.0.8 >= 1.0.8
Description
Multiple vulnerabilities have been discovered in Wireshark:
-
David Maciejak discovered a vulnerability in packet-usb.c in the USB dissector via a malformed USB Request Block (URB) (CVE-2008-4680).
-
Florent Drouin and David Maciejak reported an unspecified vulnerability in the Bluetooth RFCOMM dissector (CVE-2008-4681).
-
A malformed Tamos CommView capture file (aka .ncf file) with an "unknown/unexpected packet type" triggers a failed assertion in wtap.c (CVE-2008-4682).
-
An unchecked packet length parameter in the dissect_btacl() function in packet-bthci_acl.c in the Bluetooth ACL dissector causes an erroneous tvb_memcpy() call (CVE-2008-4683).
-
A vulnerability where packet-frame does not properly handle exceptions thrown by post dissectors caused by a certain series of packets (CVE-2008-4684).
-
Mike Davies reported a use-after-free vulnerability in the dissect_q931_cause_ie() function in packet-q931.c in the Q.931 dissector via certain packets that trigger an exception (CVE-2008-4685).
-
The Security Vulnerability Research Team of Bkis reported that the SMTP dissector could consume excessive amounts of CPU and memory (CVE-2008-5285).
-
The vendor reported that the WLCCP dissector could go into an infinite loop (CVE-2008-6472).
-
babi discovered a buffer overflow in wiretap/netscreen.c via a malformed NetScreen snoop file (CVE-2009-0599).
-
A specially crafted Tektronix K12 text capture file can cause an application crash (CVE-2009-0600).
-
An unspecified vulnerability with unknown impact and attack vectors (CVE-2009-1266).
-
Marty Adkins and Chris Maynard discovered a parsing error in the dissector for the Check Point High-Availability Protocol (CPHAP) (CVE-2009-1268).
-
Magnus Homann discovered a parsing error when loading a Tektronix .rf5 file (CVE-2009-1269).
-
The vendor reported that the PCNFSD dissector could crash (CVE-2009-1829).
Impact
A remote attacker could exploit these vulnerabilities by sending specially crafted packets on a network being monitored by Wireshark or by enticing a user to read a malformed packet trace file which can trigger a Denial of Service (application crash or excessive CPU and memory usage) and possibly allow for the execution of arbitrary code with the privileges of the user running Wireshark.
Workaround
There is no known workaround at this time.
Resolution
All Wireshark users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.0.8"
References
[ 1 ] CVE-2008-4680 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680 [ 2 ] CVE-2008-4681 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681 [ 3 ] CVE-2008-4682 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682 [ 4 ] CVE-2008-4683 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683 [ 5 ] CVE-2008-4684 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684 [ 6 ] CVE-2008-4685 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685 [ 7 ] CVE-2008-5285 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5285 [ 8 ] CVE-2008-6472 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6472 [ 9 ] CVE-2009-0599 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599 [ 10 ] CVE-2009-0600 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600 [ 11 ] CVE-2009-0601 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601 [ 12 ] CVE-2009-1210 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210 [ 13 ] CVE-2009-1266 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1266 [ 14 ] CVE-2009-1268 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268 [ 15 ] CVE-2009-1269 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269 [ 16 ] CVE-2009-1829 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200906-05.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601 http://www.wireshark.org/security/wnpa-sec-2009-01.html
Updated Packages:
Mandriva Linux 2008.1: 2d591a5772317d3587434424b8dc4a1d 2008.1/i586/dumpcap-1.0.6-0.1mdv2008.1.i586.rpm bf65e163112b4dc5db4041c552823bcb 2008.1/i586/libwireshark0-1.0.6-0.1mdv2008.1.i586.rpm 80056b13d9146428645d6e67cb2ed8ea 2008.1/i586/libwireshark-devel-1.0.6-0.1mdv2008.1.i586.rpm 7923294ad925674ef116b6273835d8ef 2008.1/i586/rawshark-1.0.6-0.1mdv2008.1.i586.rpm bd5a15d402a367058d61fd8dd6a2dcf9 2008.1/i586/tshark-1.0.6-0.1mdv2008.1.i586.rpm 5c7b0422b12d2eade1ce997de3766c6c 2008.1/i586/wireshark-1.0.6-0.1mdv2008.1.i586.rpm d116f95d212119516dbca4bf1d353cf5 2008.1/i586/wireshark-tools-1.0.6-0.1mdv2008.1.i586.rpm 2a31aab490fe670da93830f464154a48 2008.1/SRPMS/wireshark-1.0.6-0.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64: b7213fd4bf53ad0cb41b5cc5ab1057df 2008.1/x86_64/dumpcap-1.0.6-0.1mdv2008.1.x86_64.rpm 4e3f14a549d66f199171d6f91aa28c68 2008.1/x86_64/lib64wireshark0-1.0.6-0.1mdv2008.1.x86_64.rpm aa39e29909ed34d5df2f0c85ac560c8f 2008.1/x86_64/lib64wireshark-devel-1.0.6-0.1mdv2008.1.x86_64.rpm ef92c97f74a2811daf7d874755dd7777 2008.1/x86_64/rawshark-1.0.6-0.1mdv2008.1.x86_64.rpm ea555917cd20aba1f0b4114730ad9924 2008.1/x86_64/tshark-1.0.6-0.1mdv2008.1.x86_64.rpm c74402d6323f6a72188f214d2d002ef2 2008.1/x86_64/wireshark-1.0.6-0.1mdv2008.1.x86_64.rpm fa5e55f0a5934c2bae263e9151a40b16 2008.1/x86_64/wireshark-tools-1.0.6-0.1mdv2008.1.x86_64.rpm 2a31aab490fe670da93830f464154a48 2008.1/SRPMS/wireshark-1.0.6-0.1mdv2008.1.src.rpm
Mandriva Linux 2009.0: c661639631224e605d41a2985af43c93 2009.0/i586/dumpcap-1.0.6-0.1mdv2009.0.i586.rpm bb633c409ddb95d2e6f6826b6fd2be3d 2009.0/i586/libwireshark0-1.0.6-0.1mdv2009.0.i586.rpm 5d2f7434a1dd322259907d14caf90e11 2009.0/i586/libwireshark-devel-1.0.6-0.1mdv2009.0.i586.rpm d32a3de9e13b83d991a2d6c8577f50c2 2009.0/i586/rawshark-1.0.6-0.1mdv2009.0.i586.rpm bcdf64d0e05d0bb964c946c83bdd5353 2009.0/i586/tshark-1.0.6-0.1mdv2009.0.i586.rpm 3537cea11294e8d1dff87c15b933c622 2009.0/i586/wireshark-1.0.6-0.1mdv2009.0.i586.rpm c5ef95f5eb5255e10ccc12bcb0c6d77a 2009.0/i586/wireshark-tools-1.0.6-0.1mdv2009.0.i586.rpm 3efca295d42d9e1686b46ca1c020f8a2 2009.0/SRPMS/wireshark-1.0.6-0.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64: 90cffab44fe29d55f527ab4b76b0a0d6 2009.0/x86_64/dumpcap-1.0.6-0.1mdv2009.0.x86_64.rpm 838159ecdc95655df014d17d04434297 2009.0/x86_64/lib64wireshark0-1.0.6-0.1mdv2009.0.x86_64.rpm d3dba0b501696a634627540517693b62 2009.0/x86_64/lib64wireshark-devel-1.0.6-0.1mdv2009.0.x86_64.rpm bf51f59064d3ce3dd2dafd6aaaa889df 2009.0/x86_64/rawshark-1.0.6-0.1mdv2009.0.x86_64.rpm 3e33480b37b90293e1fd77c33934b9d2 2009.0/x86_64/tshark-1.0.6-0.1mdv2009.0.x86_64.rpm 6a22be605ea9e2357c8c5f38a1d6cc78 2009.0/x86_64/wireshark-1.0.6-0.1mdv2009.0.x86_64.rpm a73dd1ee57fee0b886beb0542bdd3baa 2009.0/x86_64/wireshark-tools-1.0.6-0.1mdv2009.0.x86_64.rpm 3efca295d42d9e1686b46ca1c020f8a2 2009.0/SRPMS/wireshark-1.0.6-0.1mdv2009.0.src.rpm
Corporate 4.0: cd40c4762bd0c4b5ffafc5023809ac04 corporate/4.0/i586/dumpcap-1.0.6-0.1.20060mlcs4.i586.rpm 629aa56a60730449858656e1ea062b84 corporate/4.0/i586/libwireshark0-1.0.6-0.1.20060mlcs4.i586.rpm e7674da06cff0db774a65d40c8407ce1 corporate/4.0/i586/libwireshark-devel-1.0.6-0.1.20060mlcs4.i586.rpm 76530bd71bb120b5325f9a09c39a2929 corporate/4.0/i586/rawshark-1.0.6-0.1.20060mlcs4.i586.rpm baa49a07548d639f2cb19a73c5e0df2f corporate/4.0/i586/tshark-1.0.6-0.1.20060mlcs4.i586.rpm c08beac1b46a39cbc0a46f0d360ccc40 corporate/4.0/i586/wireshark-1.0.6-0.1.20060mlcs4.i586.rpm 9e1170ca14c27d0a9b9279eb317743ad corporate/4.0/i586/wireshark-tools-1.0.6-0.1.20060mlcs4.i586.rpm dccd63a7f0c24d1ccbf5adac0374a460 corporate/4.0/SRPMS/wireshark-1.0.6-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 7d416c1d4b061a7af12eb8ddff174685 corporate/4.0/x86_64/dumpcap-1.0.6-0.1.20060mlcs4.x86_64.rpm 2c08582bff18197181d7021f471235cc corporate/4.0/x86_64/lib64wireshark0-1.0.6-0.1.20060mlcs4.x86_64.rpm 7128168a02a6dd0065d051a23992cdbe corporate/4.0/x86_64/lib64wireshark-devel-1.0.6-0.1.20060mlcs4.x86_64.rpm fee1072986b3bbbcacbe84a5def3513d corporate/4.0/x86_64/rawshark-1.0.6-0.1.20060mlcs4.x86_64.rpm c5a1394098d7c20613c51948b613ea2c corporate/4.0/x86_64/tshark-1.0.6-0.1.20060mlcs4.x86_64.rpm 279ada1e7a929b5df0a2e0813ee37d38 corporate/4.0/x86_64/wireshark-1.0.6-0.1.20060mlcs4.x86_64.rpm f28beac01c20e5d108d3390c07583918 corporate/4.0/x86_64/wireshark-tools-1.0.6-0.1.20060mlcs4.x86_64.rpm dccd63a7f0c24d1ccbf5adac0374a460 corporate/4.0/SRPMS/wireshark-1.0.6-0.1.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFJpxmTmqjQ0CJFipgRAvn+AKDefbliY7WKwLriDdVzrbgoh3FkFQCfUqov /+8NwA5cFnOJqNNg+MVuADw= =fAWE -----END PGP SIGNATURE----- . ----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list?
Click here to learn more: http://secunia.com/advisories/business_solutions/
TITLE: Wireshark NetScreen Snoop Capture File Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA33872
VERIFY ADVISORY: http://secunia.com/advisories/33872/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From remote
SOFTWARE: Wireshark 1.x http://secunia.com/advisories/product/18083/ Wireshark (formerly Ethereal) 0.x http://secunia.com/advisories/product/1228/
DESCRIPTION: A vulnerability has been reported in Wireshark, which can be exploited by malicious people to potentially compromise a user's system.
The vulnerability is caused due to a boundary error in the processing of NetScreen Snoop capture files and can be exploited to cause a stack-based buffer overflow.
Successful exploitation may allow execution of arbitrary code depending on the allocation of stack variables.
The vulnerability is reported in versions 0.99.7 through 1.0.5.
SOLUTION: Update to version 1.0.6.
PROVIDED AND/OR DISCOVERED BY: Reported by babi in a Wireshark bug report.
ORIGINAL ADVISORY: http://www.wireshark.org/security/wnpa-sec-2009-01.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200902-0885", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wireshark", "scope": "eq", "trust": 1.9, "vendor": "wireshark", "version": "1.0.5" }, { "model": "wireshark", "scope": "eq", "trust": 1.9, "vendor": "wireshark", "version": "1.0.4" }, { "model": "wireshark", "scope": "eq", "trust": 1.9, "vendor": "wireshark", "version": "1.0.3" }, { "model": "wireshark", "scope": "eq", "trust": 1.9, "vendor": "wireshark", "version": "1.0.2" }, { "model": "wireshark", "scope": "eq", "trust": 1.9, "vendor": "wireshark", "version": "1.0.1" }, { "model": "wireshark", "scope": "eq", "trust": 1.9, "vendor": "wireshark", "version": "0.99.8" }, { "model": "wireshark", "scope": "eq", "trust": 1.6, "vendor": "wireshark", "version": "1.0.0" }, { "model": "wireshark", "scope": "eq", "trust": 0.8, "vendor": "wireshark", "version": "0.99.6 - 1.0.5" }, { "model": "wireshark", "scope": "eq", "trust": 0.3, "vendor": "wireshark", "version": "1.0" }, { "model": "wireshark", "scope": "eq", "trust": 0.3, "vendor": "wireshark", "version": "0.99.7" }, { "model": "wireshark", "scope": "eq", "trust": 0.3, "vendor": "wireshark", "version": "0.99.6" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.3" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "communication manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0.3" }, { "model": "communication manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.4" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "communication manager sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "wireshark", "scope": "ne", "trust": 0.3, "vendor": "wireshark", "version": "1.0.6" } ], "sources": [ { "db": "BID", "id": "33690" }, { "db": "JVNDB", "id": "JVNDB-2009-001408" }, { "db": "CNNVD", "id": "CNNVD-200902-363" }, { "db": "NVD", "id": "CVE-2009-0601" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:linux:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2009-0601" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Magnus Homann magnus@homann.se", "sources": [ { "db": "CNNVD", "id": "CNNVD-200902-363" } ], "trust": 0.6 }, "cve": "CVE-2009-0601", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2009-0601", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-38047", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2009-0601", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-200902-363", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-38047", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-38047" }, { "db": "JVNDB", "id": "JVNDB-2009-001408" }, { "db": "CNNVD", "id": "CNNVD-200902-363" }, { "db": "NVD", "id": "CVE-2009-0601" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable. Wireshark is prone to multiple denial-of-service vulnerabilities. \nExploiting these issues may allow attackers to crash the application, denying service to legitimate users. Attackers may be able to leverage some of these vulnerabilities to execute arbitrary code, but this has not been confirmed. \nThese issues affect Wireshark 0.99.6 through 1.0.5. If the user is tricked into grabbing malicious packets from the network or opening a malicious packet capture file, it may cause Wireshark to crash. This fixes some\nvulnerabilities, which can be exploited by malicious people to\npotentially compromise a user\u0027s system. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200906-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Wireshark: Multiple vulnerabilities\n Date: June 30, 2009\n Bugs: #242996, #248425, #258013, #264571, #271062\n ID: 200906-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in Wireshark which allow\nfor Denial of Service (application crash) or remote code execution. \n\nBackground\n==========\n\nWireshark is a versatile network protocol analyzer. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-analyzer/wireshark \u003c 1.0.8 \u003e= 1.0.8\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Wireshark:\n\n* David Maciejak discovered a vulnerability in packet-usb.c in the\n USB dissector via a malformed USB Request Block (URB)\n (CVE-2008-4680). \n\n* Florent Drouin and David Maciejak reported an unspecified\n vulnerability in the Bluetooth RFCOMM dissector (CVE-2008-4681). \n\n* A malformed Tamos CommView capture file (aka .ncf file) with an\n \"unknown/unexpected packet type\" triggers a failed assertion in\n wtap.c (CVE-2008-4682). \n\n* An unchecked packet length parameter in the dissect_btacl()\n function in packet-bthci_acl.c in the Bluetooth ACL dissector causes\n an erroneous tvb_memcpy() call (CVE-2008-4683). \n\n* A vulnerability where packet-frame does not properly handle\n exceptions thrown by post dissectors caused by a certain series of\n packets (CVE-2008-4684). \n\n* Mike Davies reported a use-after-free vulnerability in the\n dissect_q931_cause_ie() function in packet-q931.c in the Q.931\n dissector via certain packets that trigger an exception\n (CVE-2008-4685). \n\n* The Security Vulnerability Research Team of Bkis reported that the\n SMTP dissector could consume excessive amounts of CPU and memory\n (CVE-2008-5285). \n\n* The vendor reported that the WLCCP dissector could go into an\n infinite loop (CVE-2008-6472). \n\n* babi discovered a buffer overflow in wiretap/netscreen.c via a\n malformed NetScreen snoop file (CVE-2009-0599). \n\n* A specially crafted Tektronix K12 text capture file can cause an\n application crash (CVE-2009-0600). \n\n* An unspecified vulnerability with unknown impact and attack vectors\n (CVE-2009-1266). \n\n* Marty Adkins and Chris Maynard discovered a parsing error in the\n dissector for the Check Point High-Availability Protocol (CPHAP)\n (CVE-2009-1268). \n\n* Magnus Homann discovered a parsing error when loading a Tektronix\n .rf5 file (CVE-2009-1269). \n\n* The vendor reported that the PCNFSD dissector could crash\n (CVE-2009-1829). \n\nImpact\n======\n\nA remote attacker could exploit these vulnerabilities by sending\nspecially crafted packets on a network being monitored by Wireshark or\nby enticing a user to read a malformed packet trace file which can\ntrigger a Denial of Service (application crash or excessive CPU and\nmemory usage) and possibly allow for the execution of arbitrary code\nwith the privileges of the user running Wireshark. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Wireshark users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-analyzer/wireshark-1.0.8\"\n\nReferences\n==========\n\n [ 1 ] CVE-2008-4680\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680\n [ 2 ] CVE-2008-4681\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681\n [ 3 ] CVE-2008-4682\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682\n [ 4 ] CVE-2008-4683\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683\n [ 5 ] CVE-2008-4684\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684\n [ 6 ] CVE-2008-4685\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685\n [ 7 ] CVE-2008-5285\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5285\n [ 8 ] CVE-2008-6472\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6472\n [ 9 ] CVE-2009-0599\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599\n [ 10 ] CVE-2009-0600\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600\n [ 11 ] CVE-2009-0601\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601\n [ 12 ] CVE-2009-1210\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210\n [ 13 ] CVE-2009-1266\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1266\n [ 14 ] CVE-2009-1268\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268\n [ 15 ] CVE-2009-1269\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269\n [ 16 ] CVE-2009-1829\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200906-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2009 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601\n http://www.wireshark.org/security/wnpa-sec-2009-01.html\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2008.1:\n 2d591a5772317d3587434424b8dc4a1d 2008.1/i586/dumpcap-1.0.6-0.1mdv2008.1.i586.rpm\n bf65e163112b4dc5db4041c552823bcb 2008.1/i586/libwireshark0-1.0.6-0.1mdv2008.1.i586.rpm\n 80056b13d9146428645d6e67cb2ed8ea 2008.1/i586/libwireshark-devel-1.0.6-0.1mdv2008.1.i586.rpm\n 7923294ad925674ef116b6273835d8ef 2008.1/i586/rawshark-1.0.6-0.1mdv2008.1.i586.rpm\n bd5a15d402a367058d61fd8dd6a2dcf9 2008.1/i586/tshark-1.0.6-0.1mdv2008.1.i586.rpm\n 5c7b0422b12d2eade1ce997de3766c6c 2008.1/i586/wireshark-1.0.6-0.1mdv2008.1.i586.rpm\n d116f95d212119516dbca4bf1d353cf5 2008.1/i586/wireshark-tools-1.0.6-0.1mdv2008.1.i586.rpm \n 2a31aab490fe670da93830f464154a48 2008.1/SRPMS/wireshark-1.0.6-0.1mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n b7213fd4bf53ad0cb41b5cc5ab1057df 2008.1/x86_64/dumpcap-1.0.6-0.1mdv2008.1.x86_64.rpm\n 4e3f14a549d66f199171d6f91aa28c68 2008.1/x86_64/lib64wireshark0-1.0.6-0.1mdv2008.1.x86_64.rpm\n aa39e29909ed34d5df2f0c85ac560c8f 2008.1/x86_64/lib64wireshark-devel-1.0.6-0.1mdv2008.1.x86_64.rpm\n ef92c97f74a2811daf7d874755dd7777 2008.1/x86_64/rawshark-1.0.6-0.1mdv2008.1.x86_64.rpm\n ea555917cd20aba1f0b4114730ad9924 2008.1/x86_64/tshark-1.0.6-0.1mdv2008.1.x86_64.rpm\n c74402d6323f6a72188f214d2d002ef2 2008.1/x86_64/wireshark-1.0.6-0.1mdv2008.1.x86_64.rpm\n fa5e55f0a5934c2bae263e9151a40b16 2008.1/x86_64/wireshark-tools-1.0.6-0.1mdv2008.1.x86_64.rpm \n 2a31aab490fe670da93830f464154a48 2008.1/SRPMS/wireshark-1.0.6-0.1mdv2008.1.src.rpm\n\n Mandriva Linux 2009.0:\n c661639631224e605d41a2985af43c93 2009.0/i586/dumpcap-1.0.6-0.1mdv2009.0.i586.rpm\n bb633c409ddb95d2e6f6826b6fd2be3d 2009.0/i586/libwireshark0-1.0.6-0.1mdv2009.0.i586.rpm\n 5d2f7434a1dd322259907d14caf90e11 2009.0/i586/libwireshark-devel-1.0.6-0.1mdv2009.0.i586.rpm\n d32a3de9e13b83d991a2d6c8577f50c2 2009.0/i586/rawshark-1.0.6-0.1mdv2009.0.i586.rpm\n bcdf64d0e05d0bb964c946c83bdd5353 2009.0/i586/tshark-1.0.6-0.1mdv2009.0.i586.rpm\n 3537cea11294e8d1dff87c15b933c622 2009.0/i586/wireshark-1.0.6-0.1mdv2009.0.i586.rpm\n c5ef95f5eb5255e10ccc12bcb0c6d77a 2009.0/i586/wireshark-tools-1.0.6-0.1mdv2009.0.i586.rpm \n 3efca295d42d9e1686b46ca1c020f8a2 2009.0/SRPMS/wireshark-1.0.6-0.1mdv2009.0.src.rpm\n\n Mandriva Linux 2009.0/X86_64:\n 90cffab44fe29d55f527ab4b76b0a0d6 2009.0/x86_64/dumpcap-1.0.6-0.1mdv2009.0.x86_64.rpm\n 838159ecdc95655df014d17d04434297 2009.0/x86_64/lib64wireshark0-1.0.6-0.1mdv2009.0.x86_64.rpm\n d3dba0b501696a634627540517693b62 2009.0/x86_64/lib64wireshark-devel-1.0.6-0.1mdv2009.0.x86_64.rpm\n bf51f59064d3ce3dd2dafd6aaaa889df 2009.0/x86_64/rawshark-1.0.6-0.1mdv2009.0.x86_64.rpm\n 3e33480b37b90293e1fd77c33934b9d2 2009.0/x86_64/tshark-1.0.6-0.1mdv2009.0.x86_64.rpm\n 6a22be605ea9e2357c8c5f38a1d6cc78 2009.0/x86_64/wireshark-1.0.6-0.1mdv2009.0.x86_64.rpm\n a73dd1ee57fee0b886beb0542bdd3baa 2009.0/x86_64/wireshark-tools-1.0.6-0.1mdv2009.0.x86_64.rpm \n 3efca295d42d9e1686b46ca1c020f8a2 2009.0/SRPMS/wireshark-1.0.6-0.1mdv2009.0.src.rpm\n\n Corporate 4.0:\n cd40c4762bd0c4b5ffafc5023809ac04 corporate/4.0/i586/dumpcap-1.0.6-0.1.20060mlcs4.i586.rpm\n 629aa56a60730449858656e1ea062b84 corporate/4.0/i586/libwireshark0-1.0.6-0.1.20060mlcs4.i586.rpm\n e7674da06cff0db774a65d40c8407ce1 corporate/4.0/i586/libwireshark-devel-1.0.6-0.1.20060mlcs4.i586.rpm\n 76530bd71bb120b5325f9a09c39a2929 corporate/4.0/i586/rawshark-1.0.6-0.1.20060mlcs4.i586.rpm\n baa49a07548d639f2cb19a73c5e0df2f corporate/4.0/i586/tshark-1.0.6-0.1.20060mlcs4.i586.rpm\n c08beac1b46a39cbc0a46f0d360ccc40 corporate/4.0/i586/wireshark-1.0.6-0.1.20060mlcs4.i586.rpm\n 9e1170ca14c27d0a9b9279eb317743ad corporate/4.0/i586/wireshark-tools-1.0.6-0.1.20060mlcs4.i586.rpm \n dccd63a7f0c24d1ccbf5adac0374a460 corporate/4.0/SRPMS/wireshark-1.0.6-0.1.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 7d416c1d4b061a7af12eb8ddff174685 corporate/4.0/x86_64/dumpcap-1.0.6-0.1.20060mlcs4.x86_64.rpm\n 2c08582bff18197181d7021f471235cc corporate/4.0/x86_64/lib64wireshark0-1.0.6-0.1.20060mlcs4.x86_64.rpm\n 7128168a02a6dd0065d051a23992cdbe corporate/4.0/x86_64/lib64wireshark-devel-1.0.6-0.1.20060mlcs4.x86_64.rpm\n fee1072986b3bbbcacbe84a5def3513d corporate/4.0/x86_64/rawshark-1.0.6-0.1.20060mlcs4.x86_64.rpm\n c5a1394098d7c20613c51948b613ea2c corporate/4.0/x86_64/tshark-1.0.6-0.1.20060mlcs4.x86_64.rpm\n 279ada1e7a929b5df0a2e0813ee37d38 corporate/4.0/x86_64/wireshark-1.0.6-0.1.20060mlcs4.x86_64.rpm\n f28beac01c20e5d108d3390c07583918 corporate/4.0/x86_64/wireshark-tools-1.0.6-0.1.20060mlcs4.x86_64.rpm \n dccd63a7f0c24d1ccbf5adac0374a460 corporate/4.0/SRPMS/wireshark-1.0.6-0.1.20060mlcs4.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFJpxmTmqjQ0CJFipgRAvn+AKDefbliY7WKwLriDdVzrbgoh3FkFQCfUqov\n/+8NwA5cFnOJqNNg+MVuADw=\n=fAWE\n-----END PGP SIGNATURE-----\n. ----------------------------------------------------------------------\n\nDid you know that a change in our assessment rating, exploit code\navailability, or if an updated patch is released by the vendor, is\nnot part of this mailing-list?\n\nClick here to learn more:\nhttp://secunia.com/advisories/business_solutions/\n\n----------------------------------------------------------------------\n\nTITLE:\nWireshark NetScreen Snoop Capture File Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA33872\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/33872/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nWireshark 1.x\nhttp://secunia.com/advisories/product/18083/\nWireshark (formerly Ethereal) 0.x\nhttp://secunia.com/advisories/product/1228/\n\nDESCRIPTION:\nA vulnerability has been reported in Wireshark, which can be\nexploited by malicious people to potentially compromise a user\u0027s\nsystem. \n\nThe vulnerability is caused due to a boundary error in the processing\nof NetScreen Snoop capture files and can be exploited to cause a\nstack-based buffer overflow. \n\nSuccessful exploitation may allow execution of arbitrary code\ndepending on the allocation of stack variables. \n\nThe vulnerability is reported in versions 0.99.7 through 1.0.5. \n\nSOLUTION:\nUpdate to version 1.0.6. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by babi in a Wireshark bug report. \n\nORIGINAL ADVISORY:\nhttp://www.wireshark.org/security/wnpa-sec-2009-01.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2009-0601" }, { "db": "JVNDB", "id": "JVNDB-2009-001408" }, { "db": "BID", "id": "33690" }, { "db": "VULHUB", "id": "VHN-38047" }, { "db": "PACKETSTORM", "id": "75731" }, { "db": "PACKETSTORM", "id": "78760" }, { "db": "PACKETSTORM", "id": "75245" }, { "db": "PACKETSTORM", "id": "74778" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-0601", "trust": 3.0 }, { "db": "BID", "id": "33690", "trust": 2.8 }, { "db": "VUPEN", "id": "ADV-2009-0370", "trust": 2.5 }, { "db": "SECUNIA", "id": "34264", "trust": 1.8 }, { "db": "SECTRACK", "id": "1021697", "trust": 1.7 }, { "db": "SECUNIA", "id": "33872", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2009-001408", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200902-363", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20090312 RPSA-2009-0040-1 TSHARK WIRESHARK", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SR:2009:005", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-38047", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "75731", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "78760", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "75245", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "74778", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-38047" }, { "db": "BID", "id": "33690" }, { "db": "JVNDB", "id": "JVNDB-2009-001408" }, { "db": "PACKETSTORM", "id": "75731" }, { "db": "PACKETSTORM", "id": "78760" }, { "db": "PACKETSTORM", "id": "75245" }, { "db": "PACKETSTORM", "id": "74778" }, { "db": "CNNVD", "id": "CNNVD-200902-363" }, { "db": "NVD", "id": "CVE-2009-0601" } ] }, "id": "VAR-200902-0885", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-38047" } ], "trust": 0.01 }, "last_update_date": "2024-05-18T22:30:21.877000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Bug 3150", "trust": 0.8, "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1937" }, { "title": "wnpa-sec-2009-01", "trust": 0.8, "url": "http://www.wireshark.org/security/wnpa-sec-2009-01.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001408" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-134", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001408" }, { "db": "NVD", "id": "CVE-2009-0601" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/33690" }, { "trust": 2.2, "url": "http://www.wireshark.org/security/wnpa-sec-2009-01.html" }, { "trust": 1.9, "url": "http://www.vupen.com/english/advisories/2009/0370" }, { "trust": 1.7, "url": "http://wiki.rpath.com/advisories:rpsa-2009-0040" }, { "trust": 1.7, "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3150" }, { "trust": 1.7, "url": "https://issues.rpath.com/browse/rpl-2984" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1021697" }, { "trust": 1.7, "url": "http://secunia.com/advisories/34264" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/501763/100/0/threaded" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0601" }, { "trust": 1.0, "url": "http://secunia.com/advisories/33872/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0601" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2009/0370" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/501763/100/0/threaded" }, { "trust": 0.3, "url": "http://www.wireshark.org/" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2009-082.htm" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0600" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0601" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0600" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0599" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0599" }, { "trust": 0.1, "url": "http://secunia.com/advisories/34264/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/try_vi/" }, { "trust": 0.1, "url": "http://wiki.rpath.com/wiki/advisories:rpsa-2009-0040" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4685" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4682" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1210" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1268" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-6472" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-200906-05.xml" }, { "trust": 0.1, "url": "http://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1210" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4685" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4684" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4681" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1266" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1269" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5285" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4683" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4682" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5285" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4680" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1268" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-6472" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1269" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1829" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1829" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4681" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4684" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1266" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4683" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4680" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/18083/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/1228/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-38047" }, { "db": "BID", "id": "33690" }, { "db": "JVNDB", "id": "JVNDB-2009-001408" }, { "db": "PACKETSTORM", "id": "75731" }, { "db": "PACKETSTORM", "id": "78760" }, { "db": "PACKETSTORM", "id": "75245" }, { "db": "PACKETSTORM", "id": "74778" }, { "db": "CNNVD", "id": "CNNVD-200902-363" }, { "db": "NVD", "id": "CVE-2009-0601" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-38047" }, { "db": "BID", "id": "33690" }, { "db": "JVNDB", "id": "JVNDB-2009-001408" }, { "db": "PACKETSTORM", "id": "75731" }, { "db": "PACKETSTORM", "id": "78760" }, { "db": "PACKETSTORM", "id": "75245" }, { "db": "PACKETSTORM", "id": "74778" }, { "db": "CNNVD", "id": "CNNVD-200902-363" }, { "db": "NVD", "id": "CVE-2009-0601" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-02-16T00:00:00", "db": "VULHUB", "id": "VHN-38047" }, { "date": "2009-02-09T00:00:00", "db": "BID", "id": "33690" }, { "date": "2009-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001408" }, { "date": "2009-03-16T11:58:45", "db": "PACKETSTORM", "id": "75731" }, { "date": "2009-06-30T20:03:53", "db": "PACKETSTORM", "id": "78760" }, { "date": "2009-02-27T18:36:15", "db": "PACKETSTORM", "id": "75245" }, { "date": "2009-02-09T14:22:36", "db": "PACKETSTORM", "id": "74778" }, { "date": "2009-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200902-363" }, { "date": "2009-02-16T20:30:03.127000", "db": "NVD", "id": "CVE-2009-0601" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-10T00:00:00", "db": "VULHUB", "id": "VHN-38047" }, { "date": "2015-04-13T22:05:00", "db": "BID", "id": "33690" }, { "date": "2009-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001408" }, { "date": "2009-03-17T00:00:00", "db": "CNNVD", "id": "CNNVD-200902-363" }, { "date": "2024-05-17T17:31:39.940000", "db": "NVD", "id": "CVE-2009-0601" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-200902-363" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wireshark Format string vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001408" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "format string", "sources": [ { "db": "CNNVD", "id": "CNNVD-200902-363" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.