wnpa-sec-2009-02 · Multiple problems in Wireshark
Summary
Name: Multiple problems in Wireshark
Docid: wnpa-sec-2009-02
Date: April 6, 2009
Affected versions: 0.9.6 up to and including 1.0.6
Fixed versions: 1.0.7
Details
Description
Wireshark 1.0.7 fixes the following vulnerabilities:
- The PROFINET dissector was vulnerable to a format string overflow. (Bug 3382) Versions affected: 0.99.6 to 1.0.6 CVE-2009-1210
- The LDAP dissector could crash on Windows. (Bug 3262) Versions affected: 0.99.2 to 1.0.6 CVE-2009-1267
- The Check Point High-Availability Protocol (CPHAP) dissector could crash. (Bug 3269) Versions affected: 0.9.6 to 1.0.6 CVE-2009-1268
-
Wireshark could crash while loading a Tektronix .rf5 file.
(Bug
3366)
Versions affected: 0.99.6 to 1.0.6
CVE-2009-1269
Impact
It may be possible to make Wireshark crash by altering the HOME environment variable or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 1.0.7 or later.
If are running Wireshark {{ end_version }} or earlier (including Ethereal 0.99.0) and cannot upgrade, you can work around each of the problems listed above by doing the following:
- For each user that will run Wireshark (including root if you're running Wireshark as a privileged user), make sure the HOME environment variable doesnt' contain any "%" characters.
- Don't open any Tektronix K12 text or NetScreen capture files.