~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
Candidate: CVE-2013-4083
PublicDate: 2013-06-09
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083
 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8717
 http://www.wireshark.org/security/wnpa-sec-2013-41.html
 http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html
 http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html
 http://anonsvn.wireshark.org/viewvc?view=revision&revision=49802
 http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=49802&r2=49801&pathrev=49802
Description:
 The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP
 ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and
 1.10.0 does not validate a certain fragment length value, which allows
 remote attackers to cause a denial of service (application crash) via a
 crafted packet.
Ubuntu-Description:
Notes:
Bugs:
Priority: low
Discovered-by:
Assigned-to:


Patches_wireshark:
upstream_wireshark: released (1.6.16, 1.8.8, 1.10.1)
lucid_wireshark: ignored (reached end-of-life)
precise_wireshark: ignored (reached end-of-life)
precise/esm_wireshark: DNE (precise was needed)
quantal_wireshark: ignored (reached end-of-life)
raring_wireshark: released (1.8.2-5wheezy4build0.13.04.1)
saucy_wireshark: ignored (reached end-of-life)
trusty_wireshark: not-affected (1.10.6-1)
utopic_wireshark: not-affected (1.12.0+git+4fab41a1-1)
vivid_wireshark: not-affected (1.12.1+g01b65bf-2)
vivid/stable-phone-overlay_wireshark: DNE
vivid/ubuntu-core_wireshark: DNE
wily_wireshark: not-affected (1.12.1+g01b65bf-2)
xenial_wireshark: not-affected (1.12.1+g01b65bf-2)
yakkety_wireshark: not-affected (1.12.1+g01b65bf-2)
zesty_wireshark: not-affected (1.12.1+g01b65bf-2)
devel_wireshark: not-affected (1.12.1+g01b65bf-2)