Huawei EulerOS: Security Advisory for wireshark (EulerOS-SA-2019-2425)

Published: 2020-01-23 12:54:39
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Summary:
The remote host is missing an update for the Huawei EulerOS 'wireshark' Linux Distribution Package(s) announced via the EulerOS-SA-2019-2425 advisory.

Detection Method:
Checks if a vulnerable Linux Distribution Package version is present on the target host.

Technical Details:
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.(CVE-2018-14340) In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.(CVE-2018-14341) In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.(CVE-2018-5336) In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.(CVE-2018-7418) In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.(CVE-2017-9347) In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.(CVE-2017-9349) In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.(CVE-2018-14340) In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.(CVE-2018-14341) In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.(CVE-2018-19622) The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.(CVE-2015-8714) In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.(CVE-2017-13765) In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning ... Description truncated. Please see the references for more information.

Affected Versions:
'wireshark' Linux Distribution Package(s) on Huawei EulerOS V2.0SP2.

Recommendations:
Please install the updated Linux Distribution Package(s).

Solution Type:
Vendor Patch

Detection Type:
Linux Distribution Package

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2015-8712
https://nvd.nist.gov/vuln/detail/CVE-2015-8713
https://nvd.nist.gov/vuln/detail/CVE-2015-8714
https://nvd.nist.gov/vuln/detail/CVE-2015-8716
https://nvd.nist.gov/vuln/detail/CVE-2015-8717
https://nvd.nist.gov/vuln/detail/CVE-2015-8718
https://nvd.nist.gov/vuln/detail/CVE-2015-8719
https://nvd.nist.gov/vuln/detail/CVE-2015-8721
https://nvd.nist.gov/vuln/detail/CVE-2015-8723
https://nvd.nist.gov/vuln/detail/CVE-2015-8729
https://nvd.nist.gov/vuln/detail/CVE-2015-8731
https://nvd.nist.gov/vuln/detail/CVE-2016-2523
https://nvd.nist.gov/vuln/detail/CVE-2016-2530
https://nvd.nist.gov/vuln/detail/CVE-2016-2531
https://nvd.nist.gov/vuln/detail/CVE-2016-2532
https://nvd.nist.gov/vuln/detail/CVE-2016-4006
https://nvd.nist.gov/vuln/detail/CVE-2016-4077
https://nvd.nist.gov/vuln/detail/CVE-2016-4081
https://nvd.nist.gov/vuln/detail/CVE-2016-4085
https://nvd.nist.gov/vuln/detail/CVE-2016-5350
https://nvd.nist.gov/vuln/detail/CVE-2016-5353
https://nvd.nist.gov/vuln/detail/CVE-2016-5359
https://nvd.nist.gov/vuln/detail/CVE-2016-6505
https://nvd.nist.gov/vuln/detail/CVE-2016-6507
https://nvd.nist.gov/vuln/detail/CVE-2016-6508
https://nvd.nist.gov/vuln/detail/CVE-2016-6510
https://nvd.nist.gov/vuln/detail/CVE-2016-7177
https://nvd.nist.gov/vuln/detail/CVE-2016-7179
https://nvd.nist.gov/vuln/detail/CVE-2016-7958
https://nvd.nist.gov/vuln/detail/CVE-2016-9375
https://nvd.nist.gov/vuln/detail/CVE-2017-13765
https://nvd.nist.gov/vuln/detail/CVE-2017-17083
https://nvd.nist.gov/vuln/detail/CVE-2017-7703
https://nvd.nist.gov/vuln/detail/CVE-2017-9345
https://nvd.nist.gov/vuln/detail/CVE-2017-9347
https://nvd.nist.gov/vuln/detail/CVE-2017-9349
https://nvd.nist.gov/vuln/detail/CVE-2017-9352
https://nvd.nist.gov/vuln/detail/CVE-2018-14340
https://nvd.nist.gov/vuln/detail/CVE-2018-14341
https://nvd.nist.gov/vuln/detail/CVE-2018-16057
https://nvd.nist.gov/vuln/detail/CVE-2018-19622
https://nvd.nist.gov/vuln/detail/CVE-2018-5336
https://nvd.nist.gov/vuln/detail/CVE-2018-7418

References:

https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2425

Search
Severity
High
CVSS Score
7.8

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.