Summary
Name: Multiple problems in Wireshark
Docid: wnpa-sec-2007-03
Date: November 28, 2007
Versions affected: 0.8.16 up to and including 0.99.6
Details
Description
Note: This is a preliminary advisory for a product that has not yet been released.
Wireshark 0.99.7 fixes the following vulnerabilities:
-
Wireshark could crash when reading an MP3 file.
Versions affected: 0.99.6 -
Beyond Security discovered that Wireshark could loop
excessively while reading a malformed DNP packet.
Versions affected: 0.10.12 to 0.99.6 -
Stefan Esser discovered a buffer overflow in the SSL dissector.
Versions affected: 0.99.0 to 0.99.6 -
The ANSI MAP dissector could be susceptible to a buffer overflow on some platforms.
(Bug 1844)
Versions affected: 0.99.5 to 0.99.6 -
The Firebird/Interbase dissector could go into an infinite loop or crash.
(Bugs 1931
and
1932)
Versions affected: 0.99.6 -
The NCP dissector could cause a crash.
Versions affected: 0.99.6 -
The HTTP dissector could crash on some systems while decoding
chunked messages.
Versions affected: 0.10.14 to 0.99.6 -
The MEGACO dissector could enter a large loop and consume
system resources.
Versions affected: 0.9.14 to 0.99.6 -
The DCP ETSI dissector could enter a large loop and consume
system resources.
Versions affected: 0.99.6 -
Fabiodds discovered a buffer overflow in the iSeries (OS/400) Communication trace file parser.
(Bug 1926)
Versions affected: 0.99.0 to 0.99.6 -
The PPP dissector could overflow a buffer.
Versions affected: 0.99.6 -
The Bluetooth SDP dissector could go into an infinite loop.
Versions affected: 0.99.2 to 0.99.6 -
A malformed RPC Portmap packet could cause a crash.
(Bug 1998)
Versions affected: 0.8.16 to 0.99.6
Impact
It may be possible to make Wireshark or Ethereal crash or use up available memory by injecting a purposefully malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 0.99.7.
If are running Wireshark 0.99.6 or Ethereal 0.99.0 or earlier and cannot upgrade, you can work around each of the problems listed above by doing the following:
- Disable the HTTP, DCP ETSI, SSL, DHCP/BOOTP, and MMS dissectors.
- Select Analyze→Enabled Protocols... from the menu.
- Make sure "ANSI MAP", "BTSDP", "DCP (ETSI)", "DNP 3.0", "FB/IPB GDS DB", "HTTP", "MEGACO", "NCP", "PPP", "SSL" are un-checked.
- Click "Save", then click "OK".