Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4554 WireShark 3.0.7 and 2.6.13 5 December 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: WireShark Publisher: WireShark Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-19553 Original Bulletin: https://www.wireshark.org/docs/relnotes/wireshark-3.0.7.html https://www.wireshark.org/docs/relnotes/wireshark-2.6.13.html Comment: This bulletin contains two (2) WireShark security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Wireshark 3.0.7 Release Notes What's New The Windows and macOS installers now ship with Qt 5.12.6. They previously shipped with Qt 5.12.5. Bug Fixes The following vulnerabilities have been fixed: * wnpa-sec-2019-22 CMS dissector crash. Bug 15961. CVE-2019-19553. The following bugs have been fixed: * ws_pipe_wait_for_pipe() can wait on closed handles. Bug 15696. * Support for 11ax in PEEKREMOTE. Bug 15740. * The temporary file ... could not be opened: Invalid argument. Bug 15751. * Reassembling of the two TLS records is not working correctly. Bug 16109. * Display Filter Area: Dropdown Missing pkt_comment and tcp.options.sack_perm (likely others). Bug 16130. * Display Filter autocompletion should be disabled. Bug 16132. * BGP Linkstate IP Reachability information is incorrect. Bug 16144. * NGAP: ExpectedUEActivityBehaviour decode error. Bug 16145. * HomePlug AV dissector: MMTYPE and FMI fields are dissected incorrectly. Bug 16158. * JPEG files cannot be saved on Windows with french language. Bug 16165. * X11 --display interpreted as --display-filter which maps to -Y option. Bug 16167. * "Create new file automatically after" not working with extcap. Bug 16178. * Encrypted TLS alerts sometimes listed as decrypted. Bug 16180. * The "Remove Wireshark from the system path" package has "Add Wireshark to the system PATH" as its title. Bug 16200. * tshark -T ek -x causes get_field_data: code should not be reached. Bug 16218. * Crash on Go - Next/Previous Packet in Conversation when no packet is selected. Bug 16228. Last updated 2019-12-04 16:18:05 UTC - -------------------------------------------------------------------------------- Wireshark 2.6.13 Release Notes What's New Bug Fixes The following vulnerabilities have been fixed: * wnpa-sec-2019-22 CMS dissector crash. Bug 15961. CVE-2019-19553. The following bugs have been fixed: * Support for 11ax in PEEKREMOTE. Bug 15740. * The temporary file ... could not be opened: Invalid argument. Bug 15751. * NET-SNMP EngineID Length handling Warning. Bug 16051. * Display Filter Area: Dropdown Missing pkt_comment and tcp.options.sack_perm (likely others). Bug 16130. * BGP Linkstate IP Reachability information is incorrect. Bug 16144. * HomePlug AV dissector: MMTYPE and FMI fields are dissected incorrectly. Bug 16158. * JPEG files cannot be saved on Windows with french language. Bug 16165. * X11 --display interpreted as --display-filter which maps to -Y option. Bug 16167. * tshark -T ek -x causes get_field_data: code should not be reached. Bug 16218. * Crash on Go - Next/Previous Packet in Conversation when no packet is selected. Bug 16228. Last updated 2019-12-04 16:18:19 UTC - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXeh1UGaOgq3Tt24GAQgQvxAAjSwn9qiiziewjzUmMX78dKJqxSeJuVjj Mx2kL+2oMrl/KG1Zw63h8kM80CdkaUrvPSTbuxBZUIDxlPUx/jAkMmzQ+MM/8Vxx n6Nj91+tWP+MNwpb8wGqyAsm5x+sM0LI3n1WOxAwBozaLEVbUPn30ird+x7NI9bM eKkZU9qE/FAZPGj5qqCpp5s9QmjeV8Rj7mkS2EWn6wsqH7ffi+jNhws6iZpRc+IC AhByEZIrSjdHAPxiQwgscdIOABR+NwH8rkQZkYG5FMTWt2dtNfMewkr5Io15qF3V gdst6DEUz8PNdh6AyXWZHyUrNf8BLDv8OFXgkgTGl1NXI9gN3knHd082/zPe+1mq DpEVMhewDXj6W8tX5EvX2Zy7Zg4zKBETjCP7sGaKdlW+r4eGE1pxCSqfPbgiC+tp 9f3J65o47bhTF8N8cBzTE7YVY/aGnbkT3uOkQig+BPxKEoJS4qGjjQH91xgIwtyh 6p8W/JQmQePfFHJ9OEpoZN6hU/YjTAWy9tIzWC7hBnDyd8ZG7Ts0oSKoCdknH/+9 bpOM35v97IH0sNKMnjlw2yiAxC7bdAnVsLtZrv2n72DdujOMN82s0f6bmFIN3st8 k/kwtYoVvdspuI0FUrFci+nwHpc6pYmIXI6Qdj/IHfmPEd96oPD/H6WW6MnUw6hZ bbKznc7GrYM= =NWTl -----END PGP SIGNATURE-----