[CVE 2008-468[1-5] - Wireshark up to 1.0.3 affected by multiple security vulnerabilities
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Debian |
Fix Released
|
Unknown
|
|||
wireshark (Ubuntu) |
Fix Released
|
Medium
|
Stefan Lesicnik | ||
Gutsy |
Fix Released
|
Medium
|
Stefan Lesicnik | ||
Hardy |
Fix Released
|
Medium
|
Stefan Lesicnik | ||
Intrepid |
Fix Released
|
Medium
|
Stefan Lesicnik |
Bug Description
Binary package hint: wireshark
CVE-2008-4680
packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows
remote attackers to cause a denial of service (application crash or abort)
via a malformed USB Request Block (URB).
http://
CVE-2008-4681
Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark
0.99.7 through 1.0.3 allows remote attackers to cause a denial of service
(application crash or abort) via unknown packets.
http://
CVE-2008-4682
wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a
denial of service (application abort) via a malformed Tamos CommView
capture file (aka .ncf file) with an "unknown/unexpected packet type" that
triggers a failed assertion.
http://
CVE-2008-4683
The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL
dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to
cause a denial of service (application crash or abort) via a packet with an
invalid length, related to an erroneous tvb_memcpy call.
http://
CVE-2008-4684
packet-frame in Wireshark 0.99.2 through 1.0.3 does not properly handle
exceptions thrown by post dissectors, which allows remote attackers to
cause a denial of service (application crash) via a certain series of
packets, as demonstrated by enabling the (1) PRP or (2) MATE post
dissector.
http://
CVE-2008-4685
Use-after-free vulnerability in the dissect_
packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3
allows remote attackers to cause a denial of service (application crash or
abort) via certain packets that trigger an exception.
http://
Changed in wireshark: | |
assignee: | nobody → stefanlsd |
assignee: | nobody → stefanlsd |
assignee: | nobody → stefanlsd |
Changed in wireshark: | |
status: | New → In Progress |
Changed in wireshark: | |
importance: | Undecided → Medium |
importance: | Undecided → Medium |
importance: | Undecided → Medium |
Changed in debian: | |
status: | Unknown → Fix Released |
As per the CVE's. All releases up to 1.0.3 are affected by these bugs. These POC are taken from the original wireshark bug tracker and just renamed to easier identify which belongs to which CVE.
All of these bugs were always reproducible, except for CVE_2008-4685 which happened intermittently.
I also built a test build to remove wiresharks memory overflow and underflow detection and protection routine as some of these are actually trapped there. More details: http:// wiki.wireshark. org/Development /Canary
To reproduce (tested on current Intrepid version 1.0.3 - will test others)
For each test with EP_DEBUG_FREE and SE_DEBUG_FREE defined.
- 2008-4680 - Open the attached .pcap file.
Click Analyze - Enabled Protocols - Disable all protocols - Apply - Ok
Click Analyze - Enabled Protocols - Enable all protocols - Apply - Ok /bugs.wireshark .org/bugzilla/ show_bug. cgi?id= 2870
- 2008-4681 - Open the attached .pcap file.
- 2008-4682 - Open the attached .ncf file.
- 2008-4683 - Open the attached .pcap file twice.
- 2008-4684 - Open the attached .pcap file.
- 2008-4685 - This crash was intermittent. Ensure packet colourization is on. Open the main .pcap file, open the 1 and 2 version. And then the main again. Sometimes would crash. From the author of the patch - "Still, it's a dangling pointer we're dealing with here, so it may all come down to the specifics of the platform and compiler as to how the bug hits" - More details can be found here - https:/