-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.2398
                         Wireshark security update
                               15 July 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Wireshark
Publisher:         Wireshark
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-22235  

Original Bulletin: 
   https://www.wireshark.org/docs/relnotes/wireshark-3.2.15.html
   https://www.wireshark.org/docs/relnotes/wireshark-3.4.7.html

Comment: This bulletin contains two (2) Wireshark security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Wireshark 3.2.15 Release Notes

What is Wireshark?

Wireshark is the world's most popular network protocol analyzer. It is used for
troubleshooting, analysis, development and education.

What's New

Bug Fixes

The following vulnerabilities have been fixed:

  o wnpa-sec-2021-06 DNP dissector crash. Issue 17462. CVE-2021-22235.

The following bugs have been fixed:

  o No wlan_radio.duration calculated for PHY type: 802.11ac (VHT) Issue 17419.

  o NAN Dissector has wrong minimum length for availability attribute Issue
    17431.

New and Updated Features

There are no new features in this release.

New Protocol Support

There are no new protocols in this release.

Updated Protocol Support

DNP, GTPv2, IEEE 802.11 Radio, NAN, NR RRC, OSPF, pcapng, PNIO, RSL, and Snort
config

New and Updated Capture File Support

Catapult DCT2000, ERF, and pcap

Getting Wireshark

Wireshark source code and installation packages are available from https://
www.wireshark.org/download.html.

Vendor-supplied Packages

Most Linux and Unix vendors supply their own Wireshark packages. You can
usually install or upgrade Wireshark using the package management system
specific to that platform. A list of third-party packages can be found on the
download page on the Wireshark web site.

File Locations

Wireshark and TShark look in several different locations for preference files,
plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform
to platform. You can use About->Folders to find the default locations on your
system.

Getting Help

The User's Guide, manual pages and various other documentation can be found at
https://www.wireshark.org/docs/

Community support is available on Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for all of
Wireshark's mailing lists can be found on the web site.

Issues and feature requests can be reported on the issue tracker.

Frequently Asked Questions

A complete FAQ is available on the Wireshark web site.

Last updated 2021-07-14 16:31:08 UTC

- ------------------------------------------------------------------------------

Wireshark 3.4.7 Release Notes

What is Wireshark?

Wireshark is the world's most popular network protocol analyzer. It is used for
troubleshooting, analysis, development and education.

What's New

Bug Fixes

The following vulnerabilities have been fixed:

  o wnpa-sec-2021-06 DNP dissector crash. Issue 17462. CVE-2021-22235.

The following bugs have been fixed:

  o TCP dissector - Erroneous DSACK reporting Issue 17315.

  o No wlan_radio.duration calculated for PHY type: 802.11ac (VHT) Issue 17419.

  o NAN Dissector has wrong minimum length for availability attribute Issue
    17431.

New and Updated Features

New Protocol Support

There are no new protocols in this release.

Updated Protocol Support

ASTERIX, BT LE LL, DCE RPC, DNP, GTPv2, IEEE 802.11 Radio, LDAP, NAN,
NORDIC_BLE, NR RRC, OSPF, pcapng, PNIO, RSL, S101, Snort config, and TCP

New and Updated Capture File Support

Catapult DCT2000, ERF, and pcap

Getting Wireshark

Wireshark source code and installation packages are available from https://
www.wireshark.org/download.html.

Vendor-supplied Packages

Most Linux and Unix vendors supply their own Wireshark packages. You can
usually install or upgrade Wireshark using the package management system
specific to that platform. A list of third-party packages can be found on the
download page on the Wireshark web site.

File Locations

Wireshark and TShark look in several different locations for preference files,
plugins, SNMP MIBS, and RADIUS dictionaries. These locations vary from platform
to platform. You can use About -> Folders to find the default locations on your
system.

Getting Help

The User's Guide, manual pages and various other documentation can be found at
https://www.wireshark.org/docs/

Community support is available on Wireshark's Q&A site and on the
wireshark-users mailing list. Subscription information and archives for all of
Wireshark's mailing lists can be found on the web site.

Issues and feature requests can be reported on the issue tracker.

Frequently Asked Questions

A complete FAQ is available on the Wireshark web site.

Last updated 2021-07-14 16:36:15 UTC

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=lUXf
-----END PGP SIGNATURE-----