[Need fake sync] a lot vulnerabilities buffer overflow crash ddos

Bug #1290100 reported by Alberto Jovito
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
wireshark (Ubuntu)
Fix Released
High
Unassigned
Precise
Won't Fix
High
Unassigned
Quantal
Won't Fix
High
Unassigned
Saucy
Won't Fix
High
Unassigned
Trusty
Fix Released
High
Patricia Mathis

Bug Description

Requires updating. There are vulnerabilities:

CVE links:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2282

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281

Others links
https://www.wireshark.org/security/wnpa-sec-2014-04.html
https://www.wireshark.org/security/wnpa-sec-2014-03.html
https://www.wireshark.org/security/wnpa-sec-2014-02.html
https://www.wireshark.org/security/wnpa-sec-2014-01.html

Information extracted from the changelogs, affecting Quantal, Precise and Saucy:

- The SIP dissector could go into an infinite loop. Discovered by Alain Botti. (CVE-2013-7112)
- The BSSGP dissector could crash. Discovered by Laurent Butti. (CVE-2013-7113)
- The NTLMSSP v2 dissector could crash. Discovered by Garming Sam. (CVE-2013-7114)
- The IEEE 802.15.4 dissector could crash. (CVE-2013-6336)
- The NBAP dissector could crash. Discovered by Laurent Butti. (CVE-2013-6337)
- The SIP dissector could crash. (CVE-2013-6338)
- The OpenWire dissector could go into a large loop. Discovered by Murali. (CVE-2013-6339)
- The TCP dissector could crash. (CVE-2013-6340)
------------------------------------------------------------
Affecting Quantal and Precise:

- NBAP dissector could crash. Discovered by Laurent Butti. (No assigned CVE number)
- The RTPS dissector could overflow a buffer. Discovered by Ben Schmidt. (No assigned CVE number)
- The LDAP dissector could crash. (No assigned CVE number)
- The Netmon file parser could crash. Discovered by G. Geshev.
- The DVB-CI dissector could crash. Discovered by Laurent Butti. (CVE-2013-4930)
- The GSM A Common dissector could crash. (CVE-2013-4932)
- The Netmon file parser could crash. Discovered by G. Geshev. (CVE-2013-4933, CVE-2013-4934)
- The ASN.1 PER dissector could crash. Discovered by Oliver-Tobias Ripka. (CVE-2013-4935)
- The CAPWAP dissector could crash. Discovered by Laurent Butti. (CVE-2013-4074)
- The GMR-1 BCCH dissector could crash. Discovered by Sylvain Munaut and Laurent Butti. (CVE-2013-4075)
- The PPP dissector could crash. Discovered by Laurent Butti. (CVE-2013-4076)
- The NBAP dissector could crash. (CVE-2013-4077)
- The RDP dissector could crash. Discovered by Laurent Butti. (CVE-2013-4078)
- The HTTP dissector could overrun the stack. (CVE-2013-4081)
- The Ixia IxVeriWave file parser could overflow the heap. Discovered by Sachin Shinde. (CVE-2013-4082)
- The DCP ETSI dissector could crash. (CVE-2013-4083)
- The GTPv2 dissector could crash (CVE-2013-3555)
- The ASN.1 BER dissector could crash (CVE-2013-3557)
- The PPP CCP dissector could crash (CVE-2013-3558)
- The DCP ETSI dissector could crash. Discovered by Evan Jensen. (CVE-2013-3559)
- The MPEG DSM-CC dissector could crash. (CVE-2013-3560)
- The Websocket dissector could crash. Discovered by Moshe Kaplan. (CVE-2013-3562)
- The TCP dissector could crash (CVE-2013-2475)
- The CSN.1 dissector could crash. Discovered by Laurent Butti. (CVE-2013-2477)
- MMS dissector could crash. Discovered by Laurent Butti. (CVE-2013-2478)
- The RTPS and RTPS2 dissectors could crash. Discovered by Alyssa Milburn. (CVE-2013-2480)
- The Mount dissector could crash. Discovered by Alyssa Milburn. (CVE-2013-2481)
- The ACN dissector could attempt to divide by zero. Discovered by Alyssa Milburn. (CVE-2013-2483)
- The CIMD dissector could crash. Discovered by Moshe Kaplan. (CVE-2013-2484)
- The DTLS dissector could crash. Discovered by Laurent Butti. (CVE-2013-2488)
- The CLNP dissector could crash. Discovered independently by Laurent Butti and the Wireshark development team (CVE-2013-1582)
- The DTN dissector could crash (CVE-2013-1583, CVE-2013-1584)
- The MS-MMC dissector (and possibly others) could crash (CVE-2013-1585)
- The DTLS dissector could crash. Discovered by Laurent Butti. (CVE-2013-1586)
- The ROHC dissector could crash (CVE-2013-1587)
- The DCP-ETSI dissector could corrupt memory. Discovered by Laurent Butti. (CVE-2013-1588)
- The Wireshark dissection engine could crash. Discovered by Laurent Butti.
- The NTLMSSP dissector could overflow a buffer. Discovered by Ulf Härnhammar. (CVE-2013-1590)

information type: Private Security → Public Security
Revision history for this message
Alberto Jovito (thedemon007) wrote :

The update that corrects this was added to unstable http://metadata.ftp-master.debian.org/changelogs//main/w/wireshark/wireshark_1.10.6-1_changelog . Maybe when migrate to testing, ubuntu copy it from there to trusty. I do not think to update this package in previous versions of ubuntu.

I could not taste the binary debian unstable, because I use precise and some dependencies are not met. https://packages.debian.org/source/sid/wireshark

I downloaded the sources of the current version of the package and the new 1.10.6-1 and make a patch with debdiff. Maybe help.

Revision history for this message
Alberto Jovito (thedemon007) wrote :
summary: - [Need update to 1.8.13] 4 Vulnerabilities buffer overflow crash ddos
+ [Need update to 1.10.6] 4 Vulnerabilities buffer overflow crash ddos
Revision history for this message
Ubuntu Foundations Team Bug Bot (crichton) wrote : Re: [Need update to 1.10.6] 4 Vulnerabilities buffer overflow crash ddos

The attachment "wireshark_1.10.6-1_security_fix_trusty-proposed" seems to be a debdiff. The ubuntu-sponsors team has been subscribed to the bug report so that they can review and hopefully sponsor the debdiff. If the attachment isn't a patch, please remove the "patch" flag from the attachment, remove the "patch" tag, and if you are member of the ~ubuntu-sponsors, unsubscribe the team.

[This is an automated message performed by a Launchpad user owned by ~brian-murray, for any issue please contact him.]

tags: added: patch
Revision history for this message
Alberto Jovito (thedemon007) wrote :

I see that vulnerabilities are already corrected in all or almost all versions of debian but not yet synchronized packages.

It should change the links repository, see bug #1282805

Revision history for this message
Scott Kitterman (kitterman) wrote :

Debian has the new release, so for trusty, we can sync that. It would be really useful if you could prepare debdiffs for precise and saucy.

Changed in wireshark (Ubuntu):
status: New → Fix Released
Revision history for this message
Scott Kitterman (kitterman) wrote :

This bug was fixed in the package wireshark - 1.10.6-1
Sponsored for Alberto Jovito (thedemon007)

---------------
wireshark (1.10.6-1) unstable; urgency=high

  * New upstream release 1.10.6
    - release notes:
      https://wireshark.org/docs/relnotes/wireshark-1.10.6.html
    - security fixes:
      - The NFS dissector could crash. Discovered by Moshe Kaplan
        (CVE-2014-2281)
      - The M3UA dissector could crash. Discovered by Laurent Butti.
        (CVE-2014-2282)
      - The RLC dissector could crash. (CVE-2014-2283)
      - The MPEG file parser could overflow a buffer.
        Discovered by Wesley Neelen. (CVE-2014-2299)
  * Drop 10_allow-deprecated-gtk-functions.patch and
    11_fix-g_memmove-ftbfs-issues.patch since they are integrated upstream.
  * Generate symbols files
  * Ship wireshark.pc for pkg-config (Closes: #740716)

 -- Balint Reczey <email address hidden> Sat, 08 Mar 2014 18:26:41 +0100

Changed in wireshark (Ubuntu Trusty):
importance: Undecided → High
Changed in wireshark (Ubuntu Saucy):
importance: Undecided → High
Changed in wireshark (Ubuntu Precise):
importance: Undecided → High
Changed in wireshark (Ubuntu Quantal):
importance: Undecided → High
Revision history for this message
Sebastien Bacher (seb128) wrote :

(ubuntu-security-sponsors should probably be unsubscribed since there is no nothing to sponsor at the moment there)

Revision history for this message
Alberto Jovito (thedemon007) wrote :

@Sebastien They should not of unsubscribed, not yet fixed in previous versions of ubuntu.

@Scott To saucy can make a fake sync debian Jessie? https://wiki.ubuntu.com/SecurityTeam/SponsorsQueue

Regarding "precise" would have to also update the libraries. I think it is also feasible to make a fake sync from debian wheezy. I'll try to make a debdiff, and test from my ppa as soon as i can.

tags: added: sync
Changed in wireshark (Ubuntu Precise):
status: New → Confirmed
Changed in wireshark (Ubuntu Saucy):
status: New → Confirmed
Revision history for this message
Martin Pitt (pitti) wrote :

Unsubscribing sponsors; trusty is done, there's nothing else to sponsor. ubuntu-sponsors cannot do security updates for stables.

Revision history for this message
Martin Pitt (pitti) wrote :

Nevermind, this is already only subscribed by security-sponsors.

Revision history for this message
Alberto Jovito (thedemon007) wrote :

Synchronize the wireshark package from debian wheezy to my ppa for precise with syncpackage https://launchpad.net/~thedemon007/+archive/thedemon007 tried it and it works well. This is the debdiff he gave me. You can see in the changelog that a lot of vulnerabilities are corrected. https://launchpadlibrarian.net/169322272/wireshark_1.8.2-5wheezy10_source.changes

summary: - [Need update to 1.10.6] 4 Vulnerabilities buffer overflow crash ddos
+ [Need fake sync] a lot vulnerabilities buffer overflow crash ddos
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Alberto, thank you for the diff.gz, but it is not in a form that can be sponsored. Wireshark in precise is at version 1.6.7 so either all the patches need to be backported or you can pursue a one time exception for an SRU.

If backporting, can you prepare debdiffs as per https://wiki.ubuntu.com/SecurityTeam/UpdatePreparation#Packaging for each release you want to update?

If pursuing an SRU, I suggest first discussing it on IRC in #ubuntu-release on Freenode to make sure this is something that they would accept. If so, please follow https://wiki.ubuntu.com/StableReleaseUpdates#Procedure.

Thanks! Unsubscribing ubuntu-security-sponsors since there is nothing to sponsor at this time.

description: updated
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

FYI-- this may help with justifying an SRU, etc: http://people.canonical.com/~ubuntu-security/cve/pkg/wireshark.html

Changed in wireshark (Ubuntu Quantal):
status: New → Won't Fix
Revision history for this message
Rolf Leggewie (r0lf) wrote :

saucy has seen the end of its life and is no longer receiving any updates. Marking the saucy task for this ticket as "Won't Fix".

Changed in wireshark (Ubuntu Saucy):
status: Confirmed → Won't Fix
Changed in wireshark (Ubuntu Trusty):
assignee: nobody → Patricia Mathis (pmathis9806)
Revision history for this message
Steve Langasek (vorlon) wrote :

The Precise Pangolin has reached end of life, so this bug will not be fixed for that release

Changed in wireshark (Ubuntu Precise):
status: Confirmed → Won't Fix
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.