SUSE-SU-2013:1276-1: moderate: Security update for wireshark
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Jul 30 14:04:11 MDT 2013
SUSE Security Update: Security update for wireshark
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1276-1
Rating: moderate
References: #816887 #820973 #824900
Cross-References: CVE-2013-2486 CVE-2013-2487 CVE-2013-3555
CVE-2013-3556 CVE-2013-3557 CVE-2013-3558
CVE-2013-3559 CVE-2013-3560 CVE-2013-3561
CVE-2013-3562 CVE-2013-4074 CVE-2013-4075
CVE-2013-4076 CVE-2013-4077 CVE-2013-4078
CVE-2013-4079 CVE-2013-4080 CVE-2013-4081
CVE-2013-4082 CVE-2013-4083
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________
An update that fixes 20 vulnerabilities is now available.
Description:
This wireshark version update to 1.6.16 includes several
security and general bug fixes.
http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html
<http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.htm
l>
* The CAPWAP dissector could crash. Discovered by
Laurent Butti. (CVE-2013-4074)
* The HTTP dissector could overrun the stack.
Discovered by David Keeler. (CVE-2013-4081)
* The DCP ETSI dissector could crash. (CVE-2013-4083)
http://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html
<http://www.wireshark.org/docs/relnotes/wireshark-1.6.15.htm
l>
* The ASN.1 BER dissector could crash. ( CVE-2013-3556
CVE-2013-3557 )
The releases also fix various non-security issues.
Additionally, a crash in processing SCTP filters has been
fixed. (bug#816887)
Security Issue references:
* CVE-2013-2486
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486
>
* CVE-2013-2487
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487
>
* CVE-2013-3555
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555
>
* CVE-2013-3556
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556
>
* CVE-2013-3557
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557
>
* CVE-2013-3558
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558
>
* CVE-2013-3559
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559
>
* CVE-2013-3560
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560
>
* CVE-2013-3561
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561
>
* CVE-2013-3562
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562
>
* CVE-2013-3561
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561
>
* CVE-2013-3561
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561
>
* CVE-2013-4074
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074
>
* CVE-2013-4075
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075
>
* CVE-2013-4076
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076
>
* CVE-2013-4077
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077
>
* CVE-2013-4078
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078
>
* CVE-2013-4079
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4079
>
* CVE-2013-4080
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4080
>
* CVE-2013-4081
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081
>
* CVE-2013-4082
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082
>
* CVE-2013-4083
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083
>
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
wireshark-1.6.16-0.5.5
wireshark-devel-1.6.16-0.5.5
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
wireshark-1.6.16-0.5.5
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
wireshark-devel-1.6.16-0.5.5
References:
http://support.novell.com/security/cve/CVE-2013-2486.html
http://support.novell.com/security/cve/CVE-2013-2487.html
http://support.novell.com/security/cve/CVE-2013-3555.html
http://support.novell.com/security/cve/CVE-2013-3556.html
http://support.novell.com/security/cve/CVE-2013-3557.html
http://support.novell.com/security/cve/CVE-2013-3558.html
http://support.novell.com/security/cve/CVE-2013-3559.html
http://support.novell.com/security/cve/CVE-2013-3560.html
http://support.novell.com/security/cve/CVE-2013-3561.html
http://support.novell.com/security/cve/CVE-2013-3562.html
http://support.novell.com/security/cve/CVE-2013-4074.html
http://support.novell.com/security/cve/CVE-2013-4075.html
http://support.novell.com/security/cve/CVE-2013-4076.html
http://support.novell.com/security/cve/CVE-2013-4077.html
http://support.novell.com/security/cve/CVE-2013-4078.html
http://support.novell.com/security/cve/CVE-2013-4079.html
http://support.novell.com/security/cve/CVE-2013-4080.html
http://support.novell.com/security/cve/CVE-2013-4081.html
http://support.novell.com/security/cve/CVE-2013-4082.html
http://support.novell.com/security/cve/CVE-2013-4083.html
https://bugzilla.novell.com/816887
https://bugzilla.novell.com/820973
https://bugzilla.novell.com/824900
http://download.novell.com/patch/finder/?keywords=cb4504a53f9b3d0625f514d688e2c947
More information about the sle-security-updates
mailing list