Vigil@nce: Wireshark 1.0, denials of service
February 2010 by Vigil@nce
SYNTHESIS OF THE VULNERABILITY
Several vulnerabilities of Wireshark can be used by a remote
attacker to create a denial of service.
Severity: 2/4
Consequences: user access/rights, denial of service of service
Provenance: intranet client
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Number of vulnerabilities in this bulletin: 3
Creation date: 28/01/2010
IMPACTED PRODUCTS
– Debian Linux
– Mandriva Corporate
– Mandriva Enterprise Server
– Mandriva Linux
– Unix - plateform
DESCRIPTION OF THE VULNERABILITY
The Wireshark program captures and displays network packets.
Protocols are decoded by dissectors. They are impacted by several
vulnerabilities.
An attacker can generate a denial of service in the SMB/SMB2
dissector. [grav:1/4; CVE-2009-4377, ERR-2009-4337]
An attacker can generate a denial of service in the Infiniband
dissector. [grav:1/4; CVE-2009-2563]
An attacker can generate several buffer overflows in the LWRES
dissector. [grav:2/4; BID-37985, CVE-2010-0304, wnpa-sec-2010-02]
CHARACTERISTICS
Identifiers: BID-37985, CVE-2009-2563, CVE-2009-4377,
CVE-2010-0304, DSA 1983-1, ERR-2009-4337, MDVSA-2010:031,
VIGILANCE-VUL-9385, wnpa-sec-2010-02
http://vigilance.fr/vulnerability/Wireshark-1-0-denials-of-service-9385