Bug 991020 (CVE-2016-6511) - VUL-1: CVE-2016-6511: wireshark: OpenFlow long loop (wnpa-sec-2016-47)
Summary: VUL-1: CVE-2016-6511: wireshark: OpenFlow long loop (wnpa-sec-2016-47)
Status: RESOLVED FIXED
Alias: CVE-2016-6511
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv2:SUSE:CVE-2016-6511:4.3:(AV:N/A...
Keywords:
Depends on:
Blocks:
 
Reported: 2016-07-28 09:59 UTC by Andreas Stieger
Modified: 2017-05-11 01:29 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2016-07-28 09:59:13 UTC
Wireshark 2.0.5 and 1.12.13
https://www.wireshark.org/lists/wireshark-announce/201607/msg00001.html
https://www.wireshark.org/lists/wireshark-announce/201607/msg00002.html

The OpenFlow dissector (and possibly others) could go into a long loop. It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 1.12.13.
https://www.wireshark.org/security/wnpa-sec-2016-47.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12659
Comment 1 Swamp Workflow Management 2016-07-28 22:01:24 UTC
bugbot adjusting priority
Comment 2 Bernhard Wiedemann 2016-07-28 22:01:55 UTC
This is an autogenerated message for OBS integration:
This bug (991020) was mentioned in
https://build.opensuse.org/request/show/415693 Factory / wireshark
https://build.opensuse.org/request/show/415701 13.2+42.1 / wireshark
Comment 3 Bernhard Wiedemann 2016-08-01 20:01:49 UTC
This is an autogenerated message for OBS integration:
This bug (991020) was mentioned in
https://build.opensuse.org/request/show/416463 Factory / wireshark
https://build.opensuse.org/request/show/416464 13.2+42.1 / wireshark
Comment 4 Swamp Workflow Management 2016-08-05 22:10:24 UTC
openSUSE-SU-2016:1974-1: An update that fixes 8 vulnerabilities is now available.

Category: security (low)
Bug References: 991012,991013,991015,991016,991017,991018,991019,991020
CVE References: CVE-2016-6504,CVE-2016-6505,CVE-2016-6506,CVE-2016-6507,CVE-2016-6508,CVE-2016-6509,CVE-2016-6510,CVE-2016-6511
Sources used:
openSUSE Leap 42.1 (src):    wireshark-1.12.13-29.1
openSUSE 13.2 (src):    wireshark-1.12.13-44.1
Comment 5 Lingshan Zhu 2016-08-19 09:36:38 UTC
it is fixed in git tag 1.12.13, commit 32abb637139699bb329719ae68fdb65a7258f1bf, will update to 1.12.13
Comment 6 Lingshan Zhu 2016-08-22 07:34:42 UTC
MR sent to SLES11 Update and SLES12 Update:
https://build.suse.de/request/show/119844
https://build.suse.de/request/show/119843

Assigned to security-team@suse.de, please re-assign this bug to me after you finished you work, for my track.Thanks
Comment 7 Swamp Workflow Management 2016-09-02 10:11:53 UTC
SUSE-SU-2016:2212-1: An update that fixes 18 vulnerabilities is now available.

Category: security (moderate)
Bug References: 983671,991012,991013,991015,991016,991017,991018,991019,991020
CVE References: CVE-2016-5350,CVE-2016-5351,CVE-2016-5352,CVE-2016-5353,CVE-2016-5354,CVE-2016-5355,CVE-2016-5356,CVE-2016-5357,CVE-2016-5358,CVE-2016-5359,CVE-2016-6504,CVE-2016-6505,CVE-2016-6506,CVE-2016-6507,CVE-2016-6508,CVE-2016-6509,CVE-2016-6510,CVE-2016-6511
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    wireshark-1.12.13-0.23.1
SUSE Linux Enterprise Server 11-SP4 (src):    wireshark-1.12.13-0.23.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    wireshark-1.12.13-0.23.1
Comment 8 Swamp Workflow Management 2016-10-04 19:10:36 UTC
SUSE-SU-2016:2453-1: An update that fixes 18 vulnerabilities is now available.

Category: security (moderate)
Bug References: 983671,991012,991013,991015,991016,991017,991018,991019,991020
CVE References: CVE-2016-5350,CVE-2016-5351,CVE-2016-5352,CVE-2016-5353,CVE-2016-5354,CVE-2016-5355,CVE-2016-5356,CVE-2016-5357,CVE-2016-5358,CVE-2016-5359,CVE-2016-6504,CVE-2016-6505,CVE-2016-6506,CVE-2016-6507,CVE-2016-6508,CVE-2016-6509,CVE-2016-6510,CVE-2016-6511
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    wireshark-1.12.13-31.1
SUSE Linux Enterprise Server 12-SP1 (src):    wireshark-1.12.13-31.1
SUSE Linux Enterprise Desktop 12-SP1 (src):    wireshark-1.12.13-31.1
Comment 9 Andreas Stieger 2016-10-05 07:56:12 UTC
done