Rapid7 Vulnerability & Exploit Database

RHSA-2015:2393: wireshark security, bug fix, and enhancement update

Back to Search

RHSA-2015:2393: wireshark security, bug fix, and enhancement update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
05/26/2015
Created
07/25/2018
Added
11/20/2015
Modified
03/21/2018

Description

The wireshark packages contain a network protocol analyzer used to captureand browse the traffic running on a computer network.Several denial of service flaws were found in Wireshark. Wireshark couldcrash or stop responding if it read a malformed packet off a network, oropened a malicious dump file. (CVE-2015-2188, CVE-2015-2189, CVE-2015-2191,CVE-2015-3810, CVE-2015-3811, CVE-2015-3812, CVE-2015-3813, CVE-2014-8710,CVE-2014-8711, CVE-2014-8712, CVE-2014-8713, CVE-2014-8714, CVE-2015-0562,CVE-2015-0563, CVE-2015-0564, CVE-2015-3182, CVE-2015-6243, CVE-2015-6244,CVE-2015-6245, CVE-2015-6246, CVE-2015-6248)The CVE-2015-3182 issue was discovered by Martin Žember of Red Hat.The wireshark packages have been upgraded to upstream version 1.10.14,which provides a number of bug fixes and enhancements over the previousversion. (BZ#1238676)This update also fixes the following bug:In addition, this update adds the following enhancement:All wireshark users are advised to upgrade to these updated packages, whichcorrect these issues and add these enhancements. All running instances ofWireshark must be restarted for the update to take effect.

Solution(s)

  • redhat-upgrade-wireshark
  • redhat-upgrade-wireshark-debuginfo
  • redhat-upgrade-wireshark-devel
  • redhat-upgrade-wireshark-gnome

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;