Bug 991013 (CVE-2016-6505) - VUL-1: CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (wnpa-sec-2016-41)
Summary: VUL-1: CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (wnp...
Status: RESOLVED FIXED
Alias: CVE-2016-6505
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv2:SUSE:CVE-2016-6505:4.3:(AV:N/A...
Keywords:
Depends on:
Blocks:
 
Reported: 2016-07-28 09:57 UTC by Andreas Stieger
Modified: 2017-05-11 01:28 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2016-07-28 09:57:01 UTC
Wireshark 2.0.5 and 1.12.13
https://www.wireshark.org/lists/wireshark-announce/201607/msg00001.html
https://www.wireshark.org/lists/wireshark-announce/201607/msg00002.html

The PacketBB dissector could divide by zero. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 1.12.13.
https://www.wireshark.org/security/wnpa-sec-2016-41.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577
Comment 1 Swamp Workflow Management 2016-07-28 22:00:26 UTC
bugbot adjusting priority
Comment 2 Bernhard Wiedemann 2016-07-28 22:00:48 UTC
This is an autogenerated message for OBS integration:
This bug (991013) was mentioned in
https://build.opensuse.org/request/show/415693 Factory / wireshark
https://build.opensuse.org/request/show/415701 13.2+42.1 / wireshark
Comment 3 Bernhard Wiedemann 2016-08-01 20:00:33 UTC
This is an autogenerated message for OBS integration:
This bug (991013) was mentioned in
https://build.opensuse.org/request/show/416463 Factory / wireshark
https://build.opensuse.org/request/show/416464 13.2+42.1 / wireshark
Comment 4 Swamp Workflow Management 2016-08-05 22:09:29 UTC
openSUSE-SU-2016:1974-1: An update that fixes 8 vulnerabilities is now available.

Category: security (low)
Bug References: 991012,991013,991015,991016,991017,991018,991019,991020
CVE References: CVE-2016-6504,CVE-2016-6505,CVE-2016-6506,CVE-2016-6507,CVE-2016-6508,CVE-2016-6509,CVE-2016-6510,CVE-2016-6511
Sources used:
openSUSE Leap 42.1 (src):    wireshark-1.12.13-29.1
openSUSE 13.2 (src):    wireshark-1.12.13-44.1
Comment 5 Lingshan Zhu 2016-08-19 09:04:56 UTC
verified, it is fixed in git tag 1.12.13, commit 3ce7de0ce8d32ded8e4c0ebf747886b9b5b1b26f, will update to 1.12.13
Comment 6 Lingshan Zhu 2016-08-22 07:30:49 UTC
MR sent to SLES11 Update and SLES12 Update:
https://build.suse.de/request/show/119844
https://build.suse.de/request/show/119843

Assigned to security-team@suse.de, please re-assign this bug to me after you finished you work, for my track.Thanks
Comment 7 Swamp Workflow Management 2016-09-02 10:10:44 UTC
SUSE-SU-2016:2212-1: An update that fixes 18 vulnerabilities is now available.

Category: security (moderate)
Bug References: 983671,991012,991013,991015,991016,991017,991018,991019,991020
CVE References: CVE-2016-5350,CVE-2016-5351,CVE-2016-5352,CVE-2016-5353,CVE-2016-5354,CVE-2016-5355,CVE-2016-5356,CVE-2016-5357,CVE-2016-5358,CVE-2016-5359,CVE-2016-6504,CVE-2016-6505,CVE-2016-6506,CVE-2016-6507,CVE-2016-6508,CVE-2016-6509,CVE-2016-6510,CVE-2016-6511
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    wireshark-1.12.13-0.23.1
SUSE Linux Enterprise Server 11-SP4 (src):    wireshark-1.12.13-0.23.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    wireshark-1.12.13-0.23.1
Comment 9 Swamp Workflow Management 2016-10-04 19:09:28 UTC
SUSE-SU-2016:2453-1: An update that fixes 18 vulnerabilities is now available.

Category: security (moderate)
Bug References: 983671,991012,991013,991015,991016,991017,991018,991019,991020
CVE References: CVE-2016-5350,CVE-2016-5351,CVE-2016-5352,CVE-2016-5353,CVE-2016-5354,CVE-2016-5355,CVE-2016-5356,CVE-2016-5357,CVE-2016-5358,CVE-2016-5359,CVE-2016-6504,CVE-2016-6505,CVE-2016-6506,CVE-2016-6507,CVE-2016-6508,CVE-2016-6509,CVE-2016-6510,CVE-2016-6511
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    wireshark-1.12.13-31.1
SUSE Linux Enterprise Server 12-SP1 (src):    wireshark-1.12.13-31.1
SUSE Linux Enterprise Desktop 12-SP1 (src):    wireshark-1.12.13-31.1