~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
Candidate: CVE-2013-4081
PublicDate: 2013-06-09
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081
 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8733
 http://www.wireshark.org/security/wnpa-sec-2013-39.html
 http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html
 http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html
 http://anonsvn.wireshark.org/viewvc?view=revision&revision=49623
 http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-http.c?r1=49623&r2=49622&pathrev=49623
Description:
 The http_payload_subdissector function in epan/dissectors/packet-http.c in
 the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8
 does not properly determine when to use a recursive approach, which allows
 remote attackers to cause a denial of service (stack consumption) via a
 crafted packet.
Ubuntu-Description:
Notes:
Bugs:
Priority: low
Discovered-by:
Assigned-to:


Patches_wireshark:
upstream_wireshark: released (1.6.16, 1.8.8)
lucid_wireshark: ignored (reached end-of-life)
precise_wireshark: ignored (reached end-of-life)
precise/esm_wireshark: DNE (precise was needed)
quantal_wireshark: ignored (reached end-of-life)
raring_wireshark: released (1.8.2-5wheezy4build0.13.04.1)
saucy_wireshark: ignored (reached end-of-life)
trusty_wireshark: not-affected (1.10.6-1)
utopic_wireshark: not-affected (1.12.0+git+4fab41a1-1)
vivid_wireshark: not-affected (1.12.1+g01b65bf-2)
vivid/stable-phone-overlay_wireshark: DNE
vivid/ubuntu-core_wireshark: DNE
wily_wireshark: not-affected (1.12.1+g01b65bf-2)
xenial_wireshark: not-affected (1.12.1+g01b65bf-2)
yakkety_wireshark: not-affected (1.12.1+g01b65bf-2)
zesty_wireshark: not-affected (1.12.1+g01b65bf-2)
devel_wireshark: not-affected (1.12.1+g01b65bf-2)