-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1371
                         Wireshark security update
                               22 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Wireshark
Publisher:         Wireshark
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Denial of Service -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://www.wireshark.org/docs/relnotes/wireshark-3.2.13.html
   https://www.wireshark.org/docs/relnotes/wireshark-3.4.5.html

Comment: This bulletin contains two (2) Wireshark security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Wireshark 3.2.13 Release Notes

What is Wireshark?

Wireshark is the world's most popular network protocol analyzer. It is used for
troubleshooting, analysis, development and education.

What's New

Bug Fixes

The following vulnerabilities have been fixed:

  o wnpa-sec-2021-04 MS-WSP dissector excessive memory consumption. Issue 17331
    .

The following bugs have been fixed:

  o TShark does not print GeoIP information Issue 14691.

  o Lua TvbRanges do not support truncated captures where tvb_captured_length <
    tvb_reported_length Issue 15655.

  o TShark error when piping to "head" Issue 16192.

  o Buildbot crash output: fuzz-2021-02-22-1012761.pcap Issue 17254.

  o DNS IXFR/AXFR multiple response Issue 17293.

  o File too large Issue 17301.

  o Build fails with CMake 3.20 Issue 17314.

New and Updated Features

There are no new features in this release.

New Protocol Support

There are no new protocols in this release.

Updated Protocol Support

DECT, DNS, LDAP, MS-WSP, PROFINET, and Sysdig

New and Updated Capture File Support

pcapng

Getting Wireshark

Wireshark source code and installation packages are available from https://
www.wireshark.org/download.html.

Vendor-supplied Packages

Most Linux and Unix vendors supply their own Wireshark packages. You can
usually install or upgrade Wireshark using the package management system
specific to that platform. A list of third-party packages can be found on the
download page on the Wireshark web site.

File Locations

Wireshark and TShark look in several different locations for preference files,
plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform
to platform. You can use About->Folders to find the default locations on your
system.

Getting Help

The User's Guide, manual pages and various other documentation can be found at
https://www.wireshark.org/docs/

Community support is available on Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for all of
Wireshark's mailing lists can be found on the web site.

Issues and feature requests can be reported on the issue tracker.

Frequently Asked Questions

A complete FAQ is available on the Wireshark web site.

Last updated 2021-04-21 17:07:30 UTC


- --------------------------------------------------------------------------------


Wireshark 3.4.5 Release Notes

What is Wireshark?

Wireshark is the world's most popular network protocol analyzer. It is used for
troubleshooting, analysis, development and education.

What's New

Bug Fixes

The following vulnerabilities have been fixed:

  o wnpa-sec-2021-04 MS-WSP dissector excessive memory consumption. Issue 17331
    .

The following bugs have been fixed:

  o TShark does not print GeoIP information Issue 14691.

  o TShark error when piping to "head" Issue 16192.

  o Parts of ASCII representation in Packet Bytes pane are missing Issue 17087.

  o Buildbot crash output: fuzz-2021-02-22-1012761.pcap Issue 17254.

  o NDPE attribute of NAN packet is not dissected Issue 17278.

  o TECMP: reserved flag interpreted as part of timestamp Issue 17279.

  o Master branch does not compile at least with gcc-11 Issue 17281.

  o DNS IXFR/AXFR multiple response Issue 17293.

  o File too large Issue 17301.

  o Build fails with CMake 3.20 Issue 17314.

New and Updated Features

New Protocol Support

There are no new protocols in this release.

Updated Protocol Support

DECT, DNS, EAP, Kerberos, LDAP, MS-WSP, SMB2, Sysdig, TECMP, and WiFi NAN

New and Updated Capture File Support

pcapng

Getting Wireshark

Wireshark source code and installation packages are available from https://
www.wireshark.org/download.html.

Vendor-supplied Packages

Most Linux and Unix vendors supply their own Wireshark packages. You can
usually install or upgrade Wireshark using the package management system
specific to that platform. A list of third-party packages can be found on the
download page on the Wireshark web site.

File Locations

Wireshark and TShark look in several different locations for preference files,
plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform
to platform. You can use About -> Folders to find the default locations on your
system.

Getting Help

The User's Guide, manual pages and various other documentation can be found at
https://www.wireshark.org/docs/

Community support is available on Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for all of
Wireshark's mailing lists can be found on the web site.

Issues and feature requests can be reported on the issue tracker.

Frequently Asked Questions

A complete FAQ is available on the Wireshark web site.

Last updated 2021-04-21 17:09:57 UTC

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=jkkh
-----END PGP SIGNATURE-----