Debian Security Advisory
DLA-1802-1 wireshark -- LTS security update
- Date Reported:
- 25 May 2019
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 926718.
In Mitre's CVE dictionary: CVE-2019-10894, CVE-2019-10895, CVE-2019-10899, CVE-2019-10901, CVE-2019-10903.
- More information:
Several vulnerabilities have been found in wireshark, a network traffic analyzer.
Assertion failure in dissect_gssapi_work (packet-gssapi.c) leading to crash of the GSS-API dissector. Remote attackers might leverage this vulnerability to trigger DoS via a packet containing crafted GSS-API payload.
Insufficient data validation leading to large number of heap buffer overflows read and write in the NetScaler trace handling module (netscaler.c). Remote attackers might leverage these vulnerabilities to trigger DoS, or any other unspecified impact via crafted packets.
Heap-based buffer under-read vulnerability in the Service Location Protocol dissector. Remote attackers might leverage these vulnerabilities to trigger DoS, or any other unspecified impact via crafted SRVLOC packets.
NULL pointer dereference in the Local Download Sharing Service protocol dissector. Remote attackers might leverage these flaws to trigger DoS via crafted LDSS packets.
Missing boundary checks leading to heap out-of-bounds read vulnerability in the Microsoft Spool Subsystem protocol dissector. Remote attackers might leverage these vulnerabilities to trigger DoS, or any other unspecified impact via crafted SPOOLSS packets.
For Debian 8
Jessie, these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u19.
We recommend that you upgrade your wireshark packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS