ESB-2019.0024 - [Debian] wireshark: Multiple vulnerabilities 2019-01-02

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.0024
                         wireshark security update
                              2 January 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wireshark
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-19628 CVE-2018-19627 CVE-2018-19626
                   CVE-2018-19625 CVE-2018-19624 CVE-2018-19623
                   CVE-2018-19622 CVE-2018-18227 CVE-2018-18226
                   CVE-2018-18225 CVE-2018-12086 

Reference:         ESB-2018.3716
                   ESB-2019.0021

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4359

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4359-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 27, 2018                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2018-12086 CVE-2018-18225 CVE-2018-18226
                 CVE-2018-18227 CVE-2018-19622 CVE-2018-19623
		 CVE-2018-19624 CVE-2018-19625 CVE-2018-19626
		 CVE-2018-19627 CVE-2018-19628

Multiple vulnerabilities have been discovered in Wireshark, a network
protocol analyzer, which could result in denial of service or the
execution of arbitrary code.

For the stable distribution (stretch), these problems have been fixed in
version 2.6.5-1~deb9u1.

We recommend that you upgrade your wireshark packages.

For the detailed security status of wireshark please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wireshark

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlwk6BkACgkQEMKTtsN8
TjZeQg//epVGPGld0oOwn+9I3rD4C0GZMKOCtHW7xR5x+YKMntG7VzLAcSv33EEi
hDj2V0ZFr8NIWab0qtTun4BQMMZ7J80hy//hFr9OcAu1apdG38KW0drMG2/sBBL8
HH6ndYLgrtxqbtmqNBxPrabq+Fj01jlCwTmrd9ig0/ZQOSlRbfM+Snfjxpmwlsgl
x8ZoWi9TPD+ILZe2V6m4w81aR6FF3e540W6ADAJ233gpJbQ5mHvOlX1tJzPDTQOe
8KqGZ4FhYan7wO6u41gRHCtqMEymh1LRc+zTzeow9jNs7u83GRMT4bqerCkVKI3W
JPr1+EbYNyZApWYzeigomGQSXiTMKvURm1NxevhhZW81y0xJgHS7q7gsvu1zitQl
hUqA9r/F74Ts6uru+ubknk1OeA0UrY/ZXVMZUgsYAZ4vFvcvPzK2gqZoBMI0tAy5
PxAnScxMalJA8faUsjl/0O5URG/Sv0MKzLo9hexog7dE/vH0j5iuZqbhT7UDmvdL
B2l7XwVlZCKI5pLgNhCqBSxf3mL7sr/wzpPF2YYuFGTGQ+doTy6C9GL1Z/J/087w
Hbd7i5Pnu+GM+SXswSIsDNsq4fMYHrBJvJz+w2YWImdKuR9+fKSPAtdto/id5t9m
s61uMXB9ul+5H0pw19otWQUvJog5qcCrTFLEe5F+CMUJDjWDqrY=
=xlYz
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=6mdl
-----END PGP SIGNATURE-----

« Back to bulletins