Lucene search

K
archlinux
ArchLinuxASA-201805-23
HistoryMay 25, 2018 - 12:00 a.m.

[ASA-201805-23] wireshark-qt: multiple issues

2018-05-2500:00:00
security.archlinux.org
8

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

73.2%

Arch Linux Security Advisory ASA-201805-23

Severity: Critical
Date : 2018-05-25
CVE-ID : CVE-2018-11354 CVE-2018-11355 CVE-2018-11356 CVE-2018-11357
CVE-2018-11358 CVE-2018-11359 CVE-2018-11360 CVE-2018-11361
CVE-2018-11362
Package : wireshark-qt
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-708

Summary

The package wireshark-qt before version 2.6.1-1 is vulnerable to
multiple issues including arbitrary code execution, information
disclosure and denial of service.

Resolution

Upgrade to 2.6.1-1.

pacman -Syu “wireshark-qt>=2.6.1-1”

The problems have been fixed upstream in version 2.6.1.

Workaround

None.

Description

  • CVE-2018-11354 (information disclosure)

An out-of-bounds read has been found in the IEEE 1905.1a dissector of
Wireshark <= 2.6.0.

  • CVE-2018-11355 (arbitrary code execution)

A heap-based buffer overflow has been found in the RTCP dissector of
Wireshark <= 2.6.0.

  • CVE-2018-11356 (denial of service)

A null-pointer dereference has been found in the DNS dissector of
Wireshark <= 2.6.0.

  • CVE-2018-11357 (denial of service)

An integer overflow leading to excessive memory allocation has been
found in several dissectors of Wireshark <= 2.6.0.

  • CVE-2018-11358 (arbitrary code execution)

A heap-based use-after-free has been found in the Q.931 dissector of
Wireshark <= 2.6.0.

  • CVE-2018-11359 (denial of service)

A null-pointer dereference has been found in several dissectors of
Wireshark <= 2.6.0.

  • CVE-2018-11360 (arbitrary code execution)

A heap-based off-by-one write has been found in the GSM A DTAP
dissector of Wireshark <= 2.6.0.

  • CVE-2018-11361 (denial of service)

A heap-based out-of-bounds read has been found in the IEEE 802.11
dissector of Wireshark <= 2.6.0.

  • CVE-2018-11362 (information disclosure)

An out-of-bounds read has been found in the LDSS dissector of Wireshark
<= 2.6.0.

Impact

A remote attacker can crash the application, access sensitive
information present in memory or execute arbitrary code on the affected
host via a specially crafted network packet or by convincing a local
user to open a specially crafted PCAP file.

References

https://www.wireshark.org/security/wnpa-sec-2018-26.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647
https://www.wireshark.org/security/wnpa-sec-2018-27.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14673
https://www.wireshark.org/security/wnpa-sec-2018-29.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
https://www.wireshark.org/security/wnpa-sec-2018-28.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678
https://www.wireshark.org/security/wnpa-sec-2018-31.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689
https://www.wireshark.org/security/wnpa-sec-2018-33.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703
https://www.wireshark.org/security/wnpa-sec-2018-30.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688
https://www.wireshark.org/security/wnpa-sec-2018-32.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
https://www.wireshark.org/security/wnpa-sec-2018-25.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615
https://security.archlinux.org/CVE-2018-11354
https://security.archlinux.org/CVE-2018-11355
https://security.archlinux.org/CVE-2018-11356
https://security.archlinux.org/CVE-2018-11357
https://security.archlinux.org/CVE-2018-11358
https://security.archlinux.org/CVE-2018-11359
https://security.archlinux.org/CVE-2018-11360
https://security.archlinux.org/CVE-2018-11361
https://security.archlinux.org/CVE-2018-11362

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanywireshark-qt< 2.6.1-1UNKNOWN

References

How to protect your server from attacks?

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

73.2%

Related for ASA-201805-23