Bug 920699 (CVE-2015-2191) - VUL-1: CVE-2015-2191: wireshark: The TNEF dissector could go into an infinite loop
Summary: VUL-1: CVE-2015-2191: wireshark: The TNEF dissector could go into an infinite...
Status: RESOLVED FIXED
Alias: CVE-2015-2191
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://www.wireshark.org/security/wn...
Whiteboard: CVSSv2:NVD:CVE-2015-2191:5.0:(AV:N/AC...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-03-04 19:24 UTC by Andreas Stieger
Modified: 2019-08-30 06:52 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-03-04 19:24:20 UTC
From https://www.wireshark.org/security/wnpa-sec-2015-10.html

Name: TNEF dissector infinite loop
Docid: wnpa-sec-2015-10
Date: March 4, 2015
Affected versions: 1.12.0 to 1.12.3, 1.10.0 to 1.10.10
Fixed versions: 1.12.4, 1.10.13

References:
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191

Description: The TNEF dissector could go into an infinite loop. Discovered by Vlad Tsyrklevich.
Impact: It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Comment 2 Bernhard Wiedemann 2015-03-04 22:00:21 UTC
This is an autogenerated message for OBS integration:
This bug (920699) was mentioned in
https://build.opensuse.org/request/show/289296 13.2+13.1 / wireshark
Comment 3 Swamp Workflow Management 2015-03-04 23:01:35 UTC
bugbot adjusting priority
Comment 6 Swamp Workflow Management 2015-03-13 09:05:39 UTC
openSUSE-SU-2015:0489-1: An update that fixes 6 vulnerabilities is now available.

Category: security (moderate)
Bug References: 920695,920696,920697,920698,920699,920700
CVE References: CVE-2015-2187,CVE-2015-2188,CVE-2015-2189,CVE-2015-2190,CVE-2015-2191,CVE-2015-2192
Sources used:
openSUSE 13.2 (src):    wireshark-1.12.4-12.1
openSUSE 13.1 (src):    wireshark-1.10.13-36.1
Comment 7 Andreas Stieger 2015-04-01 16:00:58 UTC
released
Comment 8 Andreas Stieger 2015-04-01 16:05:30 UTC
(In reply to Andreas Stieger from comment #7)
> released

for SLE 11
Comment 9 Swamp Workflow Management 2015-04-02 01:05:21 UTC
SUSE-SU-2015:0653-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 920696,920697,920699
CVE References: CVE-2015-2188,CVE-2015-2189,CVE-2015-2191
Sources used:
SUSE Linux Enterprise Software Development Kit 11 SP3 (src):    wireshark-1.10.13-0.2.1
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    wireshark-1.10.13-0.2.1
SUSE Linux Enterprise Server 11 SP3 (src):    wireshark-1.10.13-0.2.1
SUSE Linux Enterprise Desktop 11 SP3 (src):    wireshark-1.10.13-0.2.1
Comment 10 Andreas Stieger 2015-04-02 11:50:07 UTC
released
Comment 11 Swamp Workflow Management 2015-04-02 12:05:24 UTC
SUSE-SU-2015:0657-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 920696,920697,920699
CVE References: CVE-2015-2188,CVE-2015-2189,CVE-2015-2191
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    wireshark-1.10.13-8.1
SUSE Linux Enterprise Server 12 (src):    wireshark-1.10.13-8.1
Comment 12 Swamp Workflow Management 2015-04-02 13:05:25 UTC
SUSE-SU-2015:0657-2: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 920696,920697,920699
CVE References: CVE-2015-2188,CVE-2015-2189,CVE-2015-2191
Sources used:
SUSE Linux Enterprise Desktop 12 (src):    wireshark-1.10.13-8.1