Rapid7 Vulnerability & Exploit Database

RHSA-2013:1569: wireshark security, bug fix, and enhancement update

Back to Search

RHSA-2013:1569: wireshark security, bug fix, and enhancement update



Wireshark, previously known as Ethereal, is a network protocol analyzer.It is used to capture and browse the traffic running on a computer network.Two flaws were found in Wireshark. If Wireshark read a malformed packet offa network or opened a malicious dump file, it could crash or, possibly,execute arbitrary code as the user running Wireshark. (CVE-2013-3559,CVE-2013-4083)Several denial of service flaws were found in Wireshark. Wireshark couldcrash or stop responding if it read a malformed packet off a network, oropened a malicious dump file. (CVE-2012-2392, CVE-2012-3825, CVE-2012-4285,CVE-2012-4288, CVE-2012-4289, CVE-2012-4290, CVE-2012-4291, CVE-2012-4292,CVE-2012-5595, CVE-2012-5597, CVE-2012-5598, CVE-2012-5599, CVE-2012-5600,CVE-2012-6056, CVE-2012-6059, CVE-2012-6060, CVE-2012-6061, CVE-2012-6062,CVE-2013-3557, CVE-2013-3561, CVE-2013-4081, CVE-2013-4927, CVE-2013-4931,CVE-2013-4932, CVE-2013-4933, CVE-2013-4934, CVE-2013-4935, CVE-2013-4936,CVE-2013-5721)The wireshark packages have been upgraded to upstream version 1.8.10, whichprovides a number of bug fixes and enhancements over the previous versions.For more information on the bugs fixed, enhancements included, andsupported protocols introduced, refer to the Wireshark Release Notes,linked to in the References. (BZ#711024)This update also fixes the following bugs:In addition, this update adds the following enhancements:All Wireshark users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues and add theseenhancements. All running instances of Wireshark must be restarted for theupdate to take effect.


  • redhat-upgrade-wireshark
  • redhat-upgrade-wireshark-debuginfo
  • redhat-upgrade-wireshark-devel
  • redhat-upgrade-wireshark-gnome

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center