Vigil@nce - Wireshark 1.12: seven vulnerabilities
May 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Wireshark 1.12.
– Impacted products: openSUSE, Wireshark
– Severity: 1/4
– Creation date: 13/05/2015
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Wireshark 1.12.
An attacker can generate an infinite loop in LBMR, in order to
trigger a denial of service. [severity:1/4; CVE-2015-3808,
CVE-2015-3809, wnpa-sec-2015-12]
An attacker can trigger a fatal error in WebSocket, in order to
trigger a denial of service. [severity:1/4; CVE-2015-3810,
wnpa-sec-2015-13]
An attacker can send a malicious WCP packet, in order to trigger a
denial of service. [severity:1/4; CVE-2015-3811, wnpa-sec-2015-14]
An attacker can create a memory leak with an X11 packet, in order
to trigger a denial of service. [severity:1/4; CVE-2015-3812,
wnpa-sec-2015-15]
An attacker can create a memory leak when packets are reassembled,
in order to trigger a denial of service. [severity:1/4;
CVE-2015-3813, wnpa-sec-2015-16]
An attacker can generate an infinite loop in IEEE 802.11, in order
to trigger a denial of service. [severity:1/4; CVE-2015-3814,
wnpa-sec-2015-17]
An attacker can create a malicious Android Logcat file, order to
trigger a denial of service when this file is read. [severity:1/4;
CVE-2015-3815, wnpa-sec-2015-18]
An attacker can force a read at an invalid address in Android
Logcat, in order to trigger a denial of service. [severity:1/4;
CVE-2015-3906]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Wireshark-1-12-seven-vulnerabilities-16902