-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4554
                        WireShark 3.0.7 and 2.6.13
                              5 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WireShark
Publisher:         WireShark
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Denial of Service -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-19553  

Original Bulletin: 
   https://www.wireshark.org/docs/relnotes/wireshark-3.0.7.html
   https://www.wireshark.org/docs/relnotes/wireshark-2.6.13.html

Comment: This bulletin contains two (2) WireShark security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Wireshark 3.0.7 Release Notes

What's New

The Windows and macOS installers now ship with Qt 5.12.6. They previously
shipped with Qt 5.12.5.

Bug Fixes

The following vulnerabilities have been fixed:

  * wnpa-sec-2019-22 CMS dissector crash. Bug 15961. CVE-2019-19553.

The following bugs have been fixed:

  * ws_pipe_wait_for_pipe() can wait on closed handles. Bug 15696.

  * Support for 11ax in PEEKREMOTE. Bug 15740.

  * The temporary file ... could not be opened: Invalid argument. Bug 15751.

  * Reassembling of the two TLS records is not working correctly. Bug 16109.

  * Display Filter Area: Dropdown Missing pkt_comment and tcp.options.sack_perm
    (likely others). Bug 16130.

  * Display Filter autocompletion should be disabled. Bug 16132.

  * BGP Linkstate IP Reachability information is incorrect. Bug 16144.

  * NGAP: ExpectedUEActivityBehaviour decode error. Bug 16145.

  * HomePlug AV dissector: MMTYPE and FMI fields are dissected incorrectly. Bug
    16158.

  * JPEG files cannot be saved on Windows with french language. Bug 16165.

  * X11 --display interpreted as --display-filter which maps to -Y option. Bug
    16167.

  * "Create new file automatically after" not working with extcap. Bug 16178.

  * Encrypted TLS alerts sometimes listed as decrypted. Bug 16180.

  * The "Remove Wireshark from the system path" package has "Add Wireshark to
    the system PATH" as its title. Bug 16200.

  * tshark -T ek -x causes get_field_data: code should not be reached. Bug
    16218.

  * Crash on Go - Next/Previous Packet in Conversation when no packet is
    selected. Bug 16228.

Last updated 2019-12-04 16:18:05 UTC

- --------------------------------------------------------------------------------

Wireshark 2.6.13 Release Notes

What's New

Bug Fixes

The following vulnerabilities have been fixed:

  * wnpa-sec-2019-22 CMS dissector crash. Bug 15961. CVE-2019-19553.

The following bugs have been fixed:

  * Support for 11ax in PEEKREMOTE. Bug 15740.

  * The temporary file ... could not be opened: Invalid argument. Bug 15751.

  * NET-SNMP EngineID Length handling Warning. Bug 16051.

  * Display Filter Area: Dropdown Missing pkt_comment and tcp.options.sack_perm
    (likely others). Bug 16130.

  * BGP Linkstate IP Reachability information is incorrect. Bug 16144.

  * HomePlug AV dissector: MMTYPE and FMI fields are dissected incorrectly. Bug
    16158.

  * JPEG files cannot be saved on Windows with french language. Bug 16165.

  * X11 --display interpreted as --display-filter which maps to -Y option. Bug
    16167.

  * tshark -T ek -x causes get_field_data: code should not be reached. Bug
    16218.

  * Crash on Go - Next/Previous Packet in Conversation when no packet is
    selected. Bug 16228.

Last updated 2019-12-04 16:18:19 UTC

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=NWTl
-----END PGP SIGNATURE-----