Bugzilla – Bug 935158
VUL-1: CVE-2015-4652: wireshark: GSM DTAP dissector crash (wnpa-sec-2015-20)
Last modified: 2016-04-27 20:21:27 UTC
Name: GSM DTAP dissector crash Docid: wnpa-sec-2015-20 Date: June 17, 2015 Description: The GSM DTAP dissector could crash. Affected versions: 1.12.0 to 1.12.x Fixed versions: 1.12.x (Note: wireshark does not make statements about affectedness of discontinued releases, meaning 1.10.x might be affected) Impact: It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Reproducer (attached): https://www.wireshark.org/download/automated/captures/fuzz-2015-05-14-29685.pcap Fix (master): https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d93be95fc0e7011e8b4ade9171e7e66146063296 Fix (master-1.12): https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=9fa6881060b46b6ea1a3c89529f6ebebc1caf77f References: https://www.wireshark.org/security/wnpa-sec-2015-20.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11201
bugbot adjusting priority
Tested with given pcap file on 1.10.14 (SLE-11-SP3 and SLE-12), didn't show problem. So close it.
Verified crash segmentation fault) on openSUSE 13.2 with Wireshark 1.12.5, reopening
I'll do an update for at last openSUSE 13.2 unless someone beats me to it. Wanted to fix the Factory qt5 failure first.
From openSUSE 13.2 only.
https://build.opensuse.org/request/show/314772
Fixes released for all affected versions.
openSUSE-SU-2015:1215-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 935157,935158 CVE References: CVE-2015-4651,CVE-2015-4652 Sources used: openSUSE 13.2 (src): wireshark-1.12.6-18.1
SUSE-SU-2015:1676-1: An update that fixes 11 vulnerabilities is now available. Category: security (moderate) Bug References: 935158,941500 CVE References: CVE-2015-3813,CVE-2015-4652,CVE-2015-6241,CVE-2015-6242,CVE-2015-6243,CVE-2015-6244,CVE-2015-6245,CVE-2015-6246,CVE-2015-6247,CVE-2015-6248,CVE-2015-6249 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): wireshark-1.12.7-0.5.3 SUSE Linux Enterprise Software Development Kit 11-SP3 (src): wireshark-1.12.7-0.5.3 SUSE Linux Enterprise Server for VMWare 11-SP3 (src): wireshark-1.12.7-0.5.3 SUSE Linux Enterprise Server 11-SP4 (src): wireshark-1.12.7-0.5.3 SUSE Linux Enterprise Server 11-SP3 (src): wireshark-1.12.7-0.5.3
SUSE-SU-2015:1676-2: An update that fixes 11 vulnerabilities is now available. Category: security (moderate) Bug References: 935158,941500 CVE References: CVE-2015-3813,CVE-2015-4652,CVE-2015-6241,CVE-2015-6242,CVE-2015-6243,CVE-2015-6244,CVE-2015-6245,CVE-2015-6246,CVE-2015-6247,CVE-2015-6248,CVE-2015-6249 Sources used: SUSE Linux Enterprise Desktop 11-SP4 (src): wireshark-1.12.7-0.5.3 SUSE Linux Enterprise Desktop 11-SP3 (src): wireshark-1.12.7-0.5.3 SUSE Linux Enterprise Debuginfo 11-SP4 (src): wireshark-1.12.7-0.5.3 SUSE Linux Enterprise Debuginfo 11-SP3 (src): wireshark-1.12.7-0.5.3
SUSE-SU-2015:1713-1: An update that fixes 10 vulnerabilities is now available. Category: security (moderate) Bug References: 935158,941500 CVE References: CVE-2015-3813,CVE-2015-6241,CVE-2015-6242,CVE-2015-6243,CVE-2015-6244,CVE-2015-6245,CVE-2015-6246,CVE-2015-6247,CVE-2015-6248,CVE-2015-6249 Sources used: SUSE Linux Enterprise Software Development Kit 12 (src): wireshark-1.12.7-15.1 SUSE Linux Enterprise Server 12 (src): wireshark-1.12.7-15.1 SUSE Linux Enterprise Desktop 12 (src): wireshark-1.12.7-15.1