ESB-2018.0272 - [Debian] wireshark: Multiple vulnerabilities 2018-01-29

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0272
                         wireshark security update
                              29 January 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wireshark
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-5336 CVE-2018-5335 CVE-2018-5334

Reference:         ESB-2018.0141

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4101

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4101-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 28, 2018                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2018-5334 CVE-2018-5335 CVE-2018-5336

It was discovered that wireshark, a network protocol analyzer, contained
several vulnerabilities in the dissectors/file parsers for IxVeriWave,
WCP, JSON, XML, NTP, XMPP and GDB, which could result in denial of
dervice or the execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version (1.12.1+g01b65bf-4+deb8u13.

For the stable distribution (stretch), these problems have been fixed in
version 2.2.6+g32dac6a-2+deb9u2.

We recommend that you upgrade your wireshark packages.

For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlpt8f0ACgkQEMKTtsN8
TjbIWg//V63Vz7GOp2pZwPtUmTVwitRIF6Bkuw9h/4VOxkTlmjUcIHeXnwQmwyJh
ggomgnDJ4nu2Hbh+VHVVIaNeTDgQ+eN4K9SvUwoEw7uBKopo1makWM3RYJAv3KzB
Ih6nQQ/+BmIlOvrf7sjPC0KfdT95Cb/yvS0Su6RTuN3DFOe1suRfMAPCcStsiQD+
/fw6xHOvOe1ogEspJvOcOI/60mDHGFBT6B5O/7/KUgRtSg6FOFydUGy93OJfheOR
l8lJNSsb02yWKQ+YwznXJInxBWW2BwuhuP1FgXgrxVMPjE8hLWK2Y6cEvpRztt9b
dqKvqxY6lA1vjuAc+0oX4F4n8SGT9edgb+qe9utdQGFIlllZj9v1lwwE9P7PWe70
8PIRSgtYKq4MmD1uqpL4b25Veog6KFgIrotrk7yCco1pnaLEzbMRSJmZ+ieFlojV
SDBxnIhptZPu8vJzbuqIrm3o8ZzdgJMQzLEHe6RyQBZwxxoUrXz/PADNIaZnTr7Y
L7UHeM6MPdF6MDKwzkQ/PRYap+c904y6fXBMOvKrthOEIsBab2bwOckoA1cDI3M/
QHy1/iZLzT311mjoUNl9Xi0NpDd5Ps3SHSXj3OidtnMwBMJ0YBHHhyDB+yHBKuCH
Vy1blmNuruC3ORiLruFoK696wzCT5LFRmoLpxYfFFAtY/4hj2fA=
=WA4T
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWm5w04x+lLeg9Ub1AQjD0g//VxKQIkPHduRL4yTHax9AW2UjuAu7+zI+
w7GXlaBhpHX/t7Qd3jIAqL80WmhVe1TDIlXdMREHPkaC49Tzl8K6asn1LbRHcxsc
XeC+DYtdzQsR3R6wWFd4BPfRmulN+sUYfEvDvy4nfn5e71/Zbl0PeOKUbvL0aSNs
uraC9qq8MiTuHPSnnoIrjodS69GN6IRPyorVhDTn9vEDd4LHqmNmkIhm2jAsl2Vo
WqcXRnGpUAjoQzOaKSqUX7bfmkngyegDoCC6Ig1tgi9UUUSFDJflHWXfXSu/fiqv
h1AqiKiM7EYtojnbNWkAvB4SWj0+eTuCVdBtGXxwwuVdvc/3TcefRQHZ7lkrrQnD
VAG401Xneoa+7Y2tQxnHSUmqOq7I1yhOAIGTFrTb0+YGbC77pI3YRCQ/fpu7Omwe
A7cwGB9fNM9UokY+wSgNPkN0CqilNXbdmyt2OKn+pZ0Cr8D8aueWEBr+SPeYR8j3
/Zt/A4sytvCxNzen6xwhh0q5SB/Kfq4WbtxDCuY0qUJspyrE9d+PN/nxhWm+n1oi
DIEAceqFC6T2IRMAEWbjYJvoM1TZVfBkrABEG/iUmmHjhs13pIe2Vu7AwopITukt
/XxhbZoJVghqZTIfutt+rZSZAbzrnw+a5M3/4lsf/n5UxOgdR1AIPUJy0HrTk5t6
BMMnKFMMS3Q=
=vQ3I
-----END PGP SIGNATURE-----

« Back to bulletins