The Wireshark team reports of multiple vulnerabilities:
Wireshark could crash when reading an MP3 file. Beyond Security discovered that Wireshark could loop excessively while reading a malformed DNP packet. Stefan Esser discovered a buffer overflow in the SSL dissector. The ANSI MAP dissector could be susceptible to a buffer overflow on some platforms. The Firebird/Interbase dissector could go into an infinite loop or crash. The NCP dissector could cause a crash. The HTTP dissector could crash on some systems while decoding chunked messages. The MEGACO dissector could enter a large loop and consume system resources. The DCP ETSI dissector could enter a large loop and consume system resources. Fabiodds discovered a buffer overflow in the iSeries (OS/400) Communication trace file parser. The PPP dissector could overflow a buffer. The Bluetooth SDP dissector could go into an infinite loop. A malformed RPC Portmap packet could cause a crash. The IPv6 dissector could loop excessively. The USB dissector could loop excessively or crash. The SMB dissector could crash. The RPL dissector could go into an infinite loop. The WiMAX dissector could crash due to unaligned access on some platforms. The CIP dissector could attempt to allocate a huge amount of memory and crash.
Impact It may be possible to make Wireshark or Ethereal crash or use up available memory by injecting a purposefully malformed packet onto the wire or by convincing someone to read a malformed packet trace file.