ESB-2018.1668 - [Debian] wireshark: Multiple vulnerabilities 2018-06-04

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1668
                         wireshark security update
                                4 June 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wireshark
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Debian GNU/Linux 9
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-11362 CVE-2018-11360 CVE-2018-11358
                   CVE-2018-9273 CVE-2018-9264 CVE-2018-9261
                   CVE-2018-7419 CVE-2018-7335 CVE-2018-7334
                   CVE-2018-7320  

Reference:         ESB-2018.1612
                   ESB-2018.1193
                   ESB-2018.0561

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4217

- --------------------------BEGIN INCLUDED TEXT--------------------

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4217-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
June 03, 2018                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2018-9273 CVE-2018-7320 CVE-2018-7334 CVE-2018-7335
                 CVE-2018-7419 CVE-2018-9261 CVE-2018-9264 CVE-2018-11358
                 CVE-2018-11360 CVE-2018-11362

It was discovered that Wireshark, a network protocol analyzer, contained
several vulnerabilities in the dissectors for PCP, ADB, NBAP, UMTS MAC,
IEEE 802.11, SIGCOMP, LDSS, GSM A DTAP and Q.931, which result in denial
of service or the execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.12.1+g01b65bf-4+deb8u14.

For the stable distribution (stretch), these problems have been fixed in
version 2.2.6+g32dac6a-2+deb9u3.

We recommend that you upgrade your wireshark packages.

For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=HkY7
-----END PGP SIGNATURE-----

« Back to bulletins