Security update for wireshark

SUSE Security Update: Security update for wireshark
Announcement ID: SUSE-SU-2013:1276-1
Rating: moderate
References: #816887 #820973 #824900
Affected Products:
  • SUSE Linux Enterprise Server 10 SP4
  • SUSE Linux Enterprise Desktop 10 SP4
  • SLE SDK 10 SP4

  • An update that fixes 20 vulnerabilities is now available.

    Description:


    This wireshark version update to 1.6.16 includes several
    security and general bug fixes.

    http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html
    l>

    * The CAPWAP dissector could crash. Discovered by
    Laurent Butti. (CVE-2013-4074)
    * The HTTP dissector could overrun the stack.
    Discovered by David Keeler. (CVE-2013-4081)
    * The DCP ETSI dissector could crash. (CVE-2013-4083)

    http://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html
    l>

    * The ASN.1 BER dissector could crash. ( CVE-2013-3556
    CVE-2013-3557 )

    The releases also fix various non-security issues.

    Additionally, a crash in processing SCTP filters has been
    fixed. (bug#816887)

    Security Issue references:

    * CVE-2013-2486
    >
    * CVE-2013-2487
    >
    * CVE-2013-3555
    >
    * CVE-2013-3556
    >
    * CVE-2013-3557
    >
    * CVE-2013-3558
    >
    * CVE-2013-3559
    >
    * CVE-2013-3560
    >
    * CVE-2013-3561
    >
    * CVE-2013-3562
    >
    * CVE-2013-3561
    >
    * CVE-2013-3561
    >
    * CVE-2013-4074
    >
    * CVE-2013-4075
    >
    * CVE-2013-4076
    >
    * CVE-2013-4077
    >
    * CVE-2013-4078
    >
    * CVE-2013-4079
    >
    * CVE-2013-4080
    >
    * CVE-2013-4081
    >
    * CVE-2013-4082
    >
    * CVE-2013-4083
    >

    Package List:

    • SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
    • wireshark-1.6.16-0.5.5
    • wireshark-devel-1.6.16-0.5.5
    • SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
    • wireshark-1.6.16-0.5.5
    • SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
    • wireshark-devel-1.6.16-0.5.5

    References:

    • http://support.novell.com/security/cve/CVE-2013-2486.html
    • http://support.novell.com/security/cve/CVE-2013-2487.html
    • http://support.novell.com/security/cve/CVE-2013-3555.html
    • http://support.novell.com/security/cve/CVE-2013-3556.html
    • http://support.novell.com/security/cve/CVE-2013-3557.html
    • http://support.novell.com/security/cve/CVE-2013-3558.html
    • http://support.novell.com/security/cve/CVE-2013-3559.html
    • http://support.novell.com/security/cve/CVE-2013-3560.html
    • http://support.novell.com/security/cve/CVE-2013-3561.html
    • http://support.novell.com/security/cve/CVE-2013-3562.html
    • http://support.novell.com/security/cve/CVE-2013-4074.html
    • http://support.novell.com/security/cve/CVE-2013-4075.html
    • http://support.novell.com/security/cve/CVE-2013-4076.html
    • http://support.novell.com/security/cve/CVE-2013-4077.html
    • http://support.novell.com/security/cve/CVE-2013-4078.html
    • http://support.novell.com/security/cve/CVE-2013-4079.html
    • http://support.novell.com/security/cve/CVE-2013-4080.html
    • http://support.novell.com/security/cve/CVE-2013-4081.html
    • http://support.novell.com/security/cve/CVE-2013-4082.html
    • http://support.novell.com/security/cve/CVE-2013-4083.html
    • https://bugzilla.novell.com/816887
    • https://bugzilla.novell.com/820973
    • https://bugzilla.novell.com/824900
    • http://download.suse.com/patch/finder/?keywords=cb4504a53f9b3d0625f514d688e2c947