Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-4082 (GCVE-0-2013-4082)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.925Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" }, { "name": "oval:org.mitre.oval:def:16886", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" }, { "name": "oval:org.mitre.oval:def:16886", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4082", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-40.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" }, { "name": "oval:org.mitre.oval:def:16886", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4082", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:49.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-4082\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-06-09T21:55:01.643\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n vwr_read en wiretap/vwr.c en el analizador Ixia IxVeriWave en Wireshark 1.8.x anterior a 1.8.8, no valida la relaci\u00f3n entre el tama\u00f1o de registro el tama\u00f1o del \\\"trailer\\\", lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer basado en memoria din\u00e1mica y ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de un paquete manipulado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"606DF728-1DA6-4989-B40A-44471CC677DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F824AE6B-B087-4C69-8F73-7B146920FC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6702EAA1-7FBD-4755-B7C2-C2B3A1AFF142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF6D1967-500E-4E96-A6D2-CE17EA839572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8400AD4-ECE9-4810-B559-D4EB03AECC50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"424B66E9-56F8-4D87-94C6-80F5EA0BD1B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BD261DB-1794-473F-BAD9-E5B7771288BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1007895-7CC2-4C2D-BACB-BAE6DECDB840\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE554781-1EB9-446E-911F-6C11970C47F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806A17E-B8F9-466D-807D-3F1E77603DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"}]}]}],\"references\":[{\"url\":\"http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/53762\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/54425\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2709\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.wireshark.org/security/wnpa-sec-2013-40.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/53762\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/54425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2709\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.wireshark.org/security/wnpa-sec-2013-40.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2015:1098-1
Vulnerability from csaf_suse
Published
2014-11-14 12:53
Modified
2014-11-14 12:53
Summary
Security update for wireshark
Notes
Title of the patch
Security update for wireshark
Description of the patch
wireshark has been updated to version 1.10.11 to fix five security issues.
These security issues have been fixed:
* SigComp UDVM buffer overflow (CVE-2014-8710).
* AMQP dissector crash (CVE-2014-8711).
* NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
* TN5250 infinite loops (CVE-2014-8714).
This non-security issue has been fixed:
* enable zlib (bnc#899303).
Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
<https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html>
Security Issues:
* CVE-2014-8711
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711>
* CVE-2014-8710
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710>
* CVE-2014-8714
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714>
* CVE-2014-8712
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712>
* CVE-2014-8713
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713>
Patchnames
sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wireshark", "title": "Title of the patch" }, { "category": "description", "text": "\nwireshark has been updated to version 1.10.11 to fix five security issues.\n\nThese security issues have been fixed:\n\n * SigComp UDVM buffer overflow (CVE-2014-8710).\n * AMQP dissector crash (CVE-2014-8711).\n * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).\n * TN5250 infinite loops (CVE-2014-8714).\n\nThis non-security issue has been fixed:\n\n * enable zlib (bnc#899303).\n\nFurther bug fixes and updated protocol support as listed in:\n\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\n\u003chttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\u003e\n\nSecurity Issues:\n\n * CVE-2014-8711\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711\u003e\n * CVE-2014-8710\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710\u003e\n * CVE-2014-8714\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714\u003e\n * CVE-2014-8712\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712\u003e\n * CVE-2014-8713\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1098-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1098-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151098-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1098-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" }, { "category": "self", "summary": "SUSE Bug 813217", "url": "https://bugzilla.suse.com/813217" }, { "category": "self", "summary": "SUSE Bug 816517", "url": "https://bugzilla.suse.com/816517" }, { "category": "self", "summary": "SUSE Bug 816887", "url": "https://bugzilla.suse.com/816887" }, { "category": "self", "summary": "SUSE Bug 820973", "url": "https://bugzilla.suse.com/820973" }, { "category": "self", "summary": "SUSE Bug 824900", "url": "https://bugzilla.suse.com/824900" }, { "category": "self", "summary": "SUSE Bug 831718", "url": "https://bugzilla.suse.com/831718" }, { "category": "self", "summary": "SUSE Bug 839607", "url": "https://bugzilla.suse.com/839607" }, { "category": "self", "summary": "SUSE Bug 848738", "url": "https://bugzilla.suse.com/848738" }, { "category": "self", "summary": "SUSE Bug 855980", "url": "https://bugzilla.suse.com/855980" }, { "category": "self", "summary": "SUSE Bug 856495", "url": "https://bugzilla.suse.com/856495" }, { "category": "self", "summary": "SUSE Bug 856496", "url": "https://bugzilla.suse.com/856496" }, { "category": "self", "summary": "SUSE Bug 856498", "url": "https://bugzilla.suse.com/856498" }, { "category": "self", "summary": "SUSE Bug 867485", "url": "https://bugzilla.suse.com/867485" }, { "category": "self", "summary": "SUSE Bug 889854", "url": "https://bugzilla.suse.com/889854" }, { "category": "self", "summary": "SUSE Bug 889899", "url": "https://bugzilla.suse.com/889899" }, { "category": "self", "summary": "SUSE Bug 889900", "url": "https://bugzilla.suse.com/889900" }, { "category": "self", "summary": "SUSE Bug 889901", "url": "https://bugzilla.suse.com/889901" }, { "category": "self", "summary": "SUSE Bug 889906", "url": "https://bugzilla.suse.com/889906" }, { "category": "self", "summary": "SUSE Bug 897055", "url": "https://bugzilla.suse.com/897055" }, { "category": "self", "summary": "SUSE Bug 899303", "url": "https://bugzilla.suse.com/899303" }, { "category": "self", "summary": "SUSE Bug 905245", "url": "https://bugzilla.suse.com/905245" }, { "category": "self", "summary": "SUSE Bug 905246", "url": "https://bugzilla.suse.com/905246" }, { "category": "self", "summary": "SUSE Bug 905247", "url": "https://bugzilla.suse.com/905247" }, { "category": "self", "summary": "SUSE Bug 905248", "url": "https://bugzilla.suse.com/905248" }, { "category": "self", "summary": "SUSE Bug 912365", "url": "https://bugzilla.suse.com/912365" }, { "category": "self", "summary": "SUSE Bug 912368", "url": "https://bugzilla.suse.com/912368" }, { "category": "self", "summary": "SUSE Bug 912369", "url": "https://bugzilla.suse.com/912369" }, { "category": "self", "summary": "SUSE Bug 912370", "url": "https://bugzilla.suse.com/912370" }, { "category": "self", "summary": "SUSE Bug 912372", "url": "https://bugzilla.suse.com/912372" }, { "category": "self", "summary": "SUSE Bug 920696", "url": "https://bugzilla.suse.com/920696" }, { "category": "self", "summary": "SUSE Bug 920697", "url": "https://bugzilla.suse.com/920697" }, { "category": "self", "summary": "SUSE Bug 920699", "url": "https://bugzilla.suse.com/920699" }, { "category": "self", "summary": "SUSE Bug 930691", "url": "https://bugzilla.suse.com/930691" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2486 page", "url": "https://www.suse.com/security/cve/CVE-2013-2486/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2487 page", "url": "https://www.suse.com/security/cve/CVE-2013-2487/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3555 page", "url": "https://www.suse.com/security/cve/CVE-2013-3555/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3556 page", "url": "https://www.suse.com/security/cve/CVE-2013-3556/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3557 page", "url": "https://www.suse.com/security/cve/CVE-2013-3557/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3558 page", "url": "https://www.suse.com/security/cve/CVE-2013-3558/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3559 page", "url": "https://www.suse.com/security/cve/CVE-2013-3559/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3560 page", "url": "https://www.suse.com/security/cve/CVE-2013-3560/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3561 page", "url": "https://www.suse.com/security/cve/CVE-2013-3561/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3562 page", "url": "https://www.suse.com/security/cve/CVE-2013-3562/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4074 page", "url": "https://www.suse.com/security/cve/CVE-2013-4074/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4075 page", "url": "https://www.suse.com/security/cve/CVE-2013-4075/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4076 page", "url": "https://www.suse.com/security/cve/CVE-2013-4076/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4077 page", "url": "https://www.suse.com/security/cve/CVE-2013-4077/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4078 page", "url": "https://www.suse.com/security/cve/CVE-2013-4078/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4079 page", "url": "https://www.suse.com/security/cve/CVE-2013-4079/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4080 page", "url": "https://www.suse.com/security/cve/CVE-2013-4080/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4081 page", "url": "https://www.suse.com/security/cve/CVE-2013-4081/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4082 page", "url": "https://www.suse.com/security/cve/CVE-2013-4082/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4083 page", "url": "https://www.suse.com/security/cve/CVE-2013-4083/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4929 page", "url": "https://www.suse.com/security/cve/CVE-2013-4929/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4930 page", "url": "https://www.suse.com/security/cve/CVE-2013-4930/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4931 page", "url": "https://www.suse.com/security/cve/CVE-2013-4931/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4932 page", "url": "https://www.suse.com/security/cve/CVE-2013-4932/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4933 page", "url": "https://www.suse.com/security/cve/CVE-2013-4933/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4934 page", "url": "https://www.suse.com/security/cve/CVE-2013-4934/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4935 page", "url": "https://www.suse.com/security/cve/CVE-2013-4935/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6336 page", "url": "https://www.suse.com/security/cve/CVE-2013-6336/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6337 page", "url": "https://www.suse.com/security/cve/CVE-2013-6337/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6338 page", "url": "https://www.suse.com/security/cve/CVE-2013-6338/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6339 page", "url": "https://www.suse.com/security/cve/CVE-2013-6339/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6340 page", "url": "https://www.suse.com/security/cve/CVE-2013-6340/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7112 page", "url": "https://www.suse.com/security/cve/CVE-2013-7112/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7113 page", "url": "https://www.suse.com/security/cve/CVE-2013-7113/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7114 page", "url": "https://www.suse.com/security/cve/CVE-2013-7114/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2281 page", "url": "https://www.suse.com/security/cve/CVE-2014-2281/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2282 page", "url": "https://www.suse.com/security/cve/CVE-2014-2282/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2283 page", "url": "https://www.suse.com/security/cve/CVE-2014-2283/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2299 page", "url": "https://www.suse.com/security/cve/CVE-2014-2299/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6421 page", "url": "https://www.suse.com/security/cve/CVE-2014-6421/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6422 page", "url": "https://www.suse.com/security/cve/CVE-2014-6422/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6423 page", "url": "https://www.suse.com/security/cve/CVE-2014-6423/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6424 page", "url": "https://www.suse.com/security/cve/CVE-2014-6424/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6427 page", "url": "https://www.suse.com/security/cve/CVE-2014-6427/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6428 page", "url": "https://www.suse.com/security/cve/CVE-2014-6428/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6429 page", "url": "https://www.suse.com/security/cve/CVE-2014-6429/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6430 page", "url": "https://www.suse.com/security/cve/CVE-2014-6430/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6431 page", "url": "https://www.suse.com/security/cve/CVE-2014-6431/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6432 page", "url": "https://www.suse.com/security/cve/CVE-2014-6432/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8710 page", "url": "https://www.suse.com/security/cve/CVE-2014-8710/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8711 page", "url": "https://www.suse.com/security/cve/CVE-2014-8711/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8712 page", "url": "https://www.suse.com/security/cve/CVE-2014-8712/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8713 page", "url": "https://www.suse.com/security/cve/CVE-2014-8713/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8714 page", "url": "https://www.suse.com/security/cve/CVE-2014-8714/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0559 page", "url": "https://www.suse.com/security/cve/CVE-2015-0559/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0560 page", "url": "https://www.suse.com/security/cve/CVE-2015-0560/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0561 page", "url": "https://www.suse.com/security/cve/CVE-2015-0561/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0562 page", "url": "https://www.suse.com/security/cve/CVE-2015-0562/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0563 page", "url": "https://www.suse.com/security/cve/CVE-2015-0563/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0564 page", "url": "https://www.suse.com/security/cve/CVE-2015-0564/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2188 page", "url": "https://www.suse.com/security/cve/CVE-2015-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2189 page", "url": "https://www.suse.com/security/cve/CVE-2015-2189/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2191 page", "url": "https://www.suse.com/security/cve/CVE-2015-2191/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3811 page", "url": "https://www.suse.com/security/cve/CVE-2015-3811/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3812 page", "url": "https://www.suse.com/security/cve/CVE-2015-3812/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3814 page", "url": "https://www.suse.com/security/cve/CVE-2015-3814/" } ], "title": "Security update for wireshark", "tracking": { "current_release_date": "2014-11-14T12:53:20Z", "generator": { "date": "2014-11-14T12:53:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1098-1", "initial_release_date": "2014-11-14T12:53:20Z", "revision_history": [ { "date": "2014-11-14T12:53:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.i586", "product": { "name": "wireshark-1.10.11-0.2.1.i586", "product_id": "wireshark-1.10.11-0.2.1.i586" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.i586", "product": { "name": "wireshark-devel-1.10.11-0.2.1.i586", "product_id": "wireshark-devel-1.10.11-0.2.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product_id": "wireshark-devel-1.10.11-0.2.1.ia64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-1.10.11-0.2.1.ia64", "product_id": "wireshark-1.10.11-0.2.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product_id": "wireshark-devel-1.10.11-0.2.1.ppc64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-1.10.11-0.2.1.ppc64", "product_id": "wireshark-1.10.11-0.2.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product_id": "wireshark-devel-1.10.11-0.2.1.s390x" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-1.10.11-0.2.1.s390x", "product_id": "wireshark-1.10.11-0.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-1.10.11-0.2.1.x86_64", "product_id": "wireshark-1.10.11-0.2.1.x86_64" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product_id": "wireshark-devel-1.10.11-0.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2486" } ], "notes": [ { "category": "general", "text": "The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2486", "url": "https://www.suse.com/security/cve/CVE-2013-2486" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2486", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-2486" }, { "cve": "CVE-2013-2487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2487" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2487", "url": "https://www.suse.com/security/cve/CVE-2013-2487" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2487", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-2487" }, { "cve": "CVE-2013-3555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3555" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3555", "url": "https://www.suse.com/security/cve/CVE-2013-3555" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3555" }, { "cve": "CVE-2013-3556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3556" } ], "notes": [ { "category": "general", "text": "The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3556", "url": "https://www.suse.com/security/cve/CVE-2013-3556" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3556" }, { "cve": "CVE-2013-3557", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3557" } ], "notes": [ { "category": "general", "text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3557", "url": "https://www.suse.com/security/cve/CVE-2013-3557" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3557" }, { "cve": "CVE-2013-3558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3558" } ], "notes": [ { "category": "general", "text": "The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3558", "url": "https://www.suse.com/security/cve/CVE-2013-3558" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3558" }, { "cve": "CVE-2013-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3559" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3559", "url": "https://www.suse.com/security/cve/CVE-2013-3559" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3559" }, { "cve": "CVE-2013-3560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3560" } ], "notes": [ { "category": "general", "text": "The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3560", "url": "https://www.suse.com/security/cve/CVE-2013-3560" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3560" }, { "cve": "CVE-2013-3561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3561" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3561", "url": "https://www.suse.com/security/cve/CVE-2013-3561" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3561" }, { "cve": "CVE-2013-3562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3562" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3562", "url": "https://www.suse.com/security/cve/CVE-2013-3562" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3562" }, { "cve": "CVE-2013-4074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4074" } ], "notes": [ { "category": "general", "text": "The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4074", "url": "https://www.suse.com/security/cve/CVE-2013-4074" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4074", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4074" }, { "cve": "CVE-2013-4075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4075" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4075", "url": "https://www.suse.com/security/cve/CVE-2013-4075" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4075", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4075", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4075" }, { "cve": "CVE-2013-4076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4076" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4076", "url": "https://www.suse.com/security/cve/CVE-2013-4076" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4076", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4076" }, { "cve": "CVE-2013-4077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4077" } ], "notes": [ { "category": "general", "text": "Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4077", "url": "https://www.suse.com/security/cve/CVE-2013-4077" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4077", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4077" }, { "cve": "CVE-2013-4078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4078" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4078", "url": "https://www.suse.com/security/cve/CVE-2013-4078" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4078", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4078" }, { "cve": "CVE-2013-4079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4079" } ], "notes": [ { "category": "general", "text": "The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4079", "url": "https://www.suse.com/security/cve/CVE-2013-4079" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4079", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4079", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4079" }, { "cve": "CVE-2013-4080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4080" } ], "notes": [ { "category": "general", "text": "The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4080", "url": "https://www.suse.com/security/cve/CVE-2013-4080" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4080", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4080" }, { "cve": "CVE-2013-4081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4081" } ], "notes": [ { "category": "general", "text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4081", "url": "https://www.suse.com/security/cve/CVE-2013-4081" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4081", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836116 for CVE-2013-4081", "url": "https://bugzilla.suse.com/836116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4081" }, { "cve": "CVE-2013-4082", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4082" } ], "notes": [ { "category": "general", "text": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4082", "url": "https://www.suse.com/security/cve/CVE-2013-4082" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4082", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4082" }, { "cve": "CVE-2013-4083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4083" } ], "notes": [ { "category": "general", "text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4083", "url": "https://www.suse.com/security/cve/CVE-2013-4083" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4083", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4083", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4083" }, { "cve": "CVE-2013-4929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4929" } ], "notes": [ { "category": "general", "text": "The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4929", "url": "https://www.suse.com/security/cve/CVE-2013-4929" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4929", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-4929" }, { "cve": "CVE-2013-4930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4930" } ], "notes": [ { "category": "general", "text": "The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4930", "url": "https://www.suse.com/security/cve/CVE-2013-4930" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4930", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4930" }, { "cve": "CVE-2013-4931", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4931" } ], "notes": [ { "category": "general", "text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4931", "url": "https://www.suse.com/security/cve/CVE-2013-4931" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4931", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4931" }, { "cve": "CVE-2013-4932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4932" } ], "notes": [ { "category": "general", "text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4932", "url": "https://www.suse.com/security/cve/CVE-2013-4932" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4932", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4932" }, { "cve": "CVE-2013-4933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4933" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4933", "url": "https://www.suse.com/security/cve/CVE-2013-4933" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4933", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4933" }, { "cve": "CVE-2013-4934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4934" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4934", "url": "https://www.suse.com/security/cve/CVE-2013-4934" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4934", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4934" }, { "cve": "CVE-2013-4935", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4935" } ], "notes": [ { "category": "general", "text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4935", "url": "https://www.suse.com/security/cve/CVE-2013-4935" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4935", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4935" }, { "cve": "CVE-2013-6336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6336" } ], "notes": [ { "category": "general", "text": "The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6336", "url": "https://www.suse.com/security/cve/CVE-2013-6336" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6336", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6336" }, { "cve": "CVE-2013-6337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6337" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6337", "url": "https://www.suse.com/security/cve/CVE-2013-6337" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6337", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6337" }, { "cve": "CVE-2013-6338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6338" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6338", "url": "https://www.suse.com/security/cve/CVE-2013-6338" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6338", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6338" }, { "cve": "CVE-2013-6339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6339" } ], "notes": [ { "category": "general", "text": "The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6339", "url": "https://www.suse.com/security/cve/CVE-2013-6339" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6339", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6339" }, { "cve": "CVE-2013-6340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6340" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6340", "url": "https://www.suse.com/security/cve/CVE-2013-6340" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6340", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6340" }, { "cve": "CVE-2013-7112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7112" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7112", "url": "https://www.suse.com/security/cve/CVE-2013-7112" }, { "category": "external", "summary": "SUSE Bug 856498 for CVE-2013-7112", "url": "https://bugzilla.suse.com/856498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7112" }, { "cve": "CVE-2013-7113", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7113" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7113", "url": "https://www.suse.com/security/cve/CVE-2013-7113" }, { "category": "external", "summary": "SUSE Bug 856495 for CVE-2013-7113", "url": "https://bugzilla.suse.com/856495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-7113" }, { "cve": "CVE-2013-7114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7114" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7114", "url": "https://www.suse.com/security/cve/CVE-2013-7114" }, { "category": "external", "summary": "SUSE Bug 856496 for CVE-2013-7114", "url": "https://bugzilla.suse.com/856496" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7114" }, { "cve": "CVE-2014-2281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2281" } ], "notes": [ { "category": "general", "text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2281", "url": "https://www.suse.com/security/cve/CVE-2014-2281" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2281", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2281" }, { "cve": "CVE-2014-2282", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2282" } ], "notes": [ { "category": "general", "text": "The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2282", "url": "https://www.suse.com/security/cve/CVE-2014-2282" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2282", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2282" }, { "cve": "CVE-2014-2283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2283" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2283", "url": "https://www.suse.com/security/cve/CVE-2014-2283" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2283", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2283" }, { "cve": "CVE-2014-2299", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2299" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2299", "url": "https://www.suse.com/security/cve/CVE-2014-2299" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2299", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "critical" } ], "title": "CVE-2014-2299" }, { "cve": "CVE-2014-6421", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6421" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6421", "url": "https://www.suse.com/security/cve/CVE-2014-6421" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6421", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6421" }, { "cve": "CVE-2014-6422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6422" } ], "notes": [ { "category": "general", "text": "The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6422", "url": "https://www.suse.com/security/cve/CVE-2014-6422" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6422", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6422" }, { "cve": "CVE-2014-6423", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6423" } ], "notes": [ { "category": "general", "text": "The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6423", "url": "https://www.suse.com/security/cve/CVE-2014-6423" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6423", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6423" }, { "cve": "CVE-2014-6424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6424" } ], "notes": [ { "category": "general", "text": "The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6424", "url": "https://www.suse.com/security/cve/CVE-2014-6424" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6424", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6424" }, { "cve": "CVE-2014-6427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6427" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6427", "url": "https://www.suse.com/security/cve/CVE-2014-6427" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6427", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6427" }, { "cve": "CVE-2014-6428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6428" } ], "notes": [ { "category": "general", "text": "The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6428", "url": "https://www.suse.com/security/cve/CVE-2014-6428" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6428", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6428" }, { "cve": "CVE-2014-6429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6429" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6429", "url": "https://www.suse.com/security/cve/CVE-2014-6429" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6429", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6429" }, { "cve": "CVE-2014-6430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6430" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6430", "url": "https://www.suse.com/security/cve/CVE-2014-6430" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6430", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6430" }, { "cve": "CVE-2014-6431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6431" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6431", "url": "https://www.suse.com/security/cve/CVE-2014-6431" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6431", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6431" }, { "cve": "CVE-2014-6432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6432" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6432", "url": "https://www.suse.com/security/cve/CVE-2014-6432" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6432", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6432" }, { "cve": "CVE-2014-8710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8710" } ], "notes": [ { "category": "general", "text": "The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8710", "url": "https://www.suse.com/security/cve/CVE-2014-8710" }, { "category": "external", "summary": "SUSE Bug 905246 for CVE-2014-8710", "url": "https://bugzilla.suse.com/905246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8710" }, { "cve": "CVE-2014-8711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8711" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8711", "url": "https://www.suse.com/security/cve/CVE-2014-8711" }, { "category": "external", "summary": "SUSE Bug 905245 for CVE-2014-8711", "url": "https://bugzilla.suse.com/905245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8711" }, { "cve": "CVE-2014-8712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8712" } ], "notes": [ { "category": "general", "text": "The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8712", "url": "https://www.suse.com/security/cve/CVE-2014-8712" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8712", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8712" }, { "cve": "CVE-2014-8713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8713" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8713", "url": "https://www.suse.com/security/cve/CVE-2014-8713" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8713", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8713" }, { "cve": "CVE-2014-8714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8714" } ], "notes": [ { "category": "general", "text": "The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8714", "url": "https://www.suse.com/security/cve/CVE-2014-8714" }, { "category": "external", "summary": "SUSE Bug 905247 for CVE-2014-8714", "url": "https://bugzilla.suse.com/905247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8714" }, { "cve": "CVE-2015-0559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0559" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0559", "url": "https://www.suse.com/security/cve/CVE-2015-0559" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0559", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0559" }, { "cve": "CVE-2015-0560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0560" } ], "notes": [ { "category": "general", "text": "The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0560", "url": "https://www.suse.com/security/cve/CVE-2015-0560" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0560", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0560" }, { "cve": "CVE-2015-0561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0561" } ], "notes": [ { "category": "general", "text": "asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0561", "url": "https://www.suse.com/security/cve/CVE-2015-0561" }, { "category": "external", "summary": "SUSE Bug 912368 for CVE-2015-0561", "url": "https://bugzilla.suse.com/912368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0561" }, { "cve": "CVE-2015-0562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0562" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0562", "url": "https://www.suse.com/security/cve/CVE-2015-0562" }, { "category": "external", "summary": "SUSE Bug 912369 for CVE-2015-0562", "url": "https://bugzilla.suse.com/912369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0562" }, { "cve": "CVE-2015-0563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0563" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0563", "url": "https://www.suse.com/security/cve/CVE-2015-0563" }, { "category": "external", "summary": "SUSE Bug 912370 for CVE-2015-0563", "url": "https://bugzilla.suse.com/912370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0563" }, { "cve": "CVE-2015-0564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0564" } ], "notes": [ { "category": "general", "text": "Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0564", "url": "https://www.suse.com/security/cve/CVE-2015-0564" }, { "category": "external", "summary": "SUSE Bug 912372 for CVE-2015-0564", "url": "https://bugzilla.suse.com/912372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0564" }, { "cve": "CVE-2015-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2188" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2188", "url": "https://www.suse.com/security/cve/CVE-2015-2188" }, { "category": "external", "summary": "SUSE Bug 920696 for CVE-2015-2188", "url": "https://bugzilla.suse.com/920696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2188" }, { "cve": "CVE-2015-2189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2189" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2189", "url": "https://www.suse.com/security/cve/CVE-2015-2189" }, { "category": "external", "summary": "SUSE Bug 920697 for CVE-2015-2189", "url": "https://bugzilla.suse.com/920697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2189" }, { "cve": "CVE-2015-2191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2191" } ], "notes": [ { "category": "general", "text": "Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2191", "url": "https://www.suse.com/security/cve/CVE-2015-2191" }, { "category": "external", "summary": "SUSE Bug 920699 for CVE-2015-2191", "url": "https://bugzilla.suse.com/920699" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2191" }, { "cve": "CVE-2015-3811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3811" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3811", "url": "https://www.suse.com/security/cve/CVE-2015-3811" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3811" }, { "cve": "CVE-2015-3812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3812" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3812", "url": "https://www.suse.com/security/cve/CVE-2015-3812" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3812" }, { "cve": "CVE-2015-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3814" } ], "notes": [ { "category": "general", "text": "The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3814", "url": "https://www.suse.com/security/cve/CVE-2015-3814" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3814" } ] }
suse-su-2015:0653-1
Vulnerability from csaf_suse
Published
2014-11-14 12:53
Modified
2014-11-14 12:53
Summary
Security update for wireshark
Notes
Title of the patch
Security update for wireshark
Description of the patch
wireshark has been updated to version 1.10.11 to fix five security issues.
These security issues have been fixed:
* SigComp UDVM buffer overflow (CVE-2014-8710).
* AMQP dissector crash (CVE-2014-8711).
* NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
* TN5250 infinite loops (CVE-2014-8714).
This non-security issue has been fixed:
* enable zlib (bnc#899303).
Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
<https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html>
Security Issues:
* CVE-2014-8711
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711>
* CVE-2014-8710
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710>
* CVE-2014-8714
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714>
* CVE-2014-8712
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712>
* CVE-2014-8713
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713>
Patchnames
sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wireshark", "title": "Title of the patch" }, { "category": "description", "text": "\nwireshark has been updated to version 1.10.11 to fix five security issues.\n\nThese security issues have been fixed:\n\n * SigComp UDVM buffer overflow (CVE-2014-8710).\n * AMQP dissector crash (CVE-2014-8711).\n * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).\n * TN5250 infinite loops (CVE-2014-8714).\n\nThis non-security issue has been fixed:\n\n * enable zlib (bnc#899303).\n\nFurther bug fixes and updated protocol support as listed in:\n\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\n\u003chttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\u003e\n\nSecurity Issues:\n\n * CVE-2014-8711\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711\u003e\n * CVE-2014-8710\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710\u003e\n * CVE-2014-8714\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714\u003e\n * CVE-2014-8712\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712\u003e\n * CVE-2014-8713\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0653-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0653-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150653-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0653-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" }, { "category": "self", "summary": "SUSE Bug 813217", "url": "https://bugzilla.suse.com/813217" }, { "category": "self", "summary": "SUSE Bug 816517", "url": "https://bugzilla.suse.com/816517" }, { "category": "self", "summary": "SUSE Bug 816887", "url": "https://bugzilla.suse.com/816887" }, { "category": "self", "summary": "SUSE Bug 820973", "url": "https://bugzilla.suse.com/820973" }, { "category": "self", "summary": "SUSE Bug 824900", "url": "https://bugzilla.suse.com/824900" }, { "category": "self", "summary": "SUSE Bug 831718", "url": "https://bugzilla.suse.com/831718" }, { "category": "self", "summary": "SUSE Bug 839607", "url": "https://bugzilla.suse.com/839607" }, { "category": "self", "summary": "SUSE Bug 848738", "url": "https://bugzilla.suse.com/848738" }, { "category": "self", "summary": "SUSE Bug 855980", "url": "https://bugzilla.suse.com/855980" }, { "category": "self", "summary": "SUSE Bug 856495", "url": "https://bugzilla.suse.com/856495" }, { "category": "self", "summary": "SUSE Bug 856496", "url": "https://bugzilla.suse.com/856496" }, { "category": "self", "summary": "SUSE Bug 856498", "url": "https://bugzilla.suse.com/856498" }, { "category": "self", "summary": "SUSE Bug 867485", "url": "https://bugzilla.suse.com/867485" }, { "category": "self", "summary": "SUSE Bug 889854", "url": "https://bugzilla.suse.com/889854" }, { "category": "self", "summary": "SUSE Bug 889899", "url": "https://bugzilla.suse.com/889899" }, { "category": "self", "summary": "SUSE Bug 889900", "url": "https://bugzilla.suse.com/889900" }, { "category": "self", "summary": "SUSE Bug 889901", "url": "https://bugzilla.suse.com/889901" }, { "category": "self", "summary": "SUSE Bug 889906", "url": "https://bugzilla.suse.com/889906" }, { "category": "self", "summary": "SUSE Bug 897055", "url": "https://bugzilla.suse.com/897055" }, { "category": "self", "summary": "SUSE Bug 899303", "url": "https://bugzilla.suse.com/899303" }, { "category": "self", "summary": "SUSE Bug 905245", "url": "https://bugzilla.suse.com/905245" }, { "category": "self", "summary": "SUSE Bug 905246", "url": "https://bugzilla.suse.com/905246" }, { "category": "self", "summary": "SUSE Bug 905247", "url": "https://bugzilla.suse.com/905247" }, { "category": "self", "summary": "SUSE Bug 905248", "url": "https://bugzilla.suse.com/905248" }, { "category": "self", "summary": "SUSE Bug 912365", "url": "https://bugzilla.suse.com/912365" }, { "category": "self", "summary": "SUSE Bug 912368", "url": "https://bugzilla.suse.com/912368" }, { "category": "self", "summary": "SUSE Bug 912369", "url": "https://bugzilla.suse.com/912369" }, { "category": "self", "summary": "SUSE Bug 912370", "url": "https://bugzilla.suse.com/912370" }, { "category": "self", "summary": "SUSE Bug 912372", "url": "https://bugzilla.suse.com/912372" }, { "category": "self", "summary": "SUSE Bug 920696", "url": "https://bugzilla.suse.com/920696" }, { "category": "self", "summary": "SUSE Bug 920697", "url": "https://bugzilla.suse.com/920697" }, { "category": "self", "summary": "SUSE Bug 920699", "url": "https://bugzilla.suse.com/920699" }, { "category": "self", "summary": "SUSE Bug 930691", "url": "https://bugzilla.suse.com/930691" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2486 page", "url": "https://www.suse.com/security/cve/CVE-2013-2486/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2487 page", "url": "https://www.suse.com/security/cve/CVE-2013-2487/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3555 page", "url": "https://www.suse.com/security/cve/CVE-2013-3555/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3556 page", "url": "https://www.suse.com/security/cve/CVE-2013-3556/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3557 page", "url": "https://www.suse.com/security/cve/CVE-2013-3557/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3558 page", "url": "https://www.suse.com/security/cve/CVE-2013-3558/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3559 page", "url": "https://www.suse.com/security/cve/CVE-2013-3559/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3560 page", "url": "https://www.suse.com/security/cve/CVE-2013-3560/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3561 page", "url": "https://www.suse.com/security/cve/CVE-2013-3561/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3562 page", "url": "https://www.suse.com/security/cve/CVE-2013-3562/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4074 page", "url": "https://www.suse.com/security/cve/CVE-2013-4074/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4075 page", "url": "https://www.suse.com/security/cve/CVE-2013-4075/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4076 page", "url": "https://www.suse.com/security/cve/CVE-2013-4076/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4077 page", "url": "https://www.suse.com/security/cve/CVE-2013-4077/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4078 page", "url": "https://www.suse.com/security/cve/CVE-2013-4078/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4079 page", "url": "https://www.suse.com/security/cve/CVE-2013-4079/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4080 page", "url": "https://www.suse.com/security/cve/CVE-2013-4080/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4081 page", "url": "https://www.suse.com/security/cve/CVE-2013-4081/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4082 page", "url": "https://www.suse.com/security/cve/CVE-2013-4082/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4083 page", "url": "https://www.suse.com/security/cve/CVE-2013-4083/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4929 page", "url": "https://www.suse.com/security/cve/CVE-2013-4929/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4930 page", "url": "https://www.suse.com/security/cve/CVE-2013-4930/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4931 page", "url": "https://www.suse.com/security/cve/CVE-2013-4931/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4932 page", "url": "https://www.suse.com/security/cve/CVE-2013-4932/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4933 page", "url": "https://www.suse.com/security/cve/CVE-2013-4933/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4934 page", "url": "https://www.suse.com/security/cve/CVE-2013-4934/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4935 page", "url": "https://www.suse.com/security/cve/CVE-2013-4935/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6336 page", "url": "https://www.suse.com/security/cve/CVE-2013-6336/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6337 page", "url": "https://www.suse.com/security/cve/CVE-2013-6337/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6338 page", "url": "https://www.suse.com/security/cve/CVE-2013-6338/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6339 page", "url": "https://www.suse.com/security/cve/CVE-2013-6339/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6340 page", "url": "https://www.suse.com/security/cve/CVE-2013-6340/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7112 page", "url": "https://www.suse.com/security/cve/CVE-2013-7112/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7113 page", "url": "https://www.suse.com/security/cve/CVE-2013-7113/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7114 page", "url": "https://www.suse.com/security/cve/CVE-2013-7114/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2281 page", "url": "https://www.suse.com/security/cve/CVE-2014-2281/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2282 page", "url": "https://www.suse.com/security/cve/CVE-2014-2282/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2283 page", "url": "https://www.suse.com/security/cve/CVE-2014-2283/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2299 page", "url": "https://www.suse.com/security/cve/CVE-2014-2299/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6421 page", "url": "https://www.suse.com/security/cve/CVE-2014-6421/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6422 page", "url": "https://www.suse.com/security/cve/CVE-2014-6422/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6423 page", "url": "https://www.suse.com/security/cve/CVE-2014-6423/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6424 page", "url": "https://www.suse.com/security/cve/CVE-2014-6424/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6427 page", "url": "https://www.suse.com/security/cve/CVE-2014-6427/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6428 page", "url": "https://www.suse.com/security/cve/CVE-2014-6428/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6429 page", "url": "https://www.suse.com/security/cve/CVE-2014-6429/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6430 page", "url": "https://www.suse.com/security/cve/CVE-2014-6430/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6431 page", "url": "https://www.suse.com/security/cve/CVE-2014-6431/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6432 page", "url": "https://www.suse.com/security/cve/CVE-2014-6432/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8710 page", "url": "https://www.suse.com/security/cve/CVE-2014-8710/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8711 page", "url": "https://www.suse.com/security/cve/CVE-2014-8711/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8712 page", "url": "https://www.suse.com/security/cve/CVE-2014-8712/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8713 page", "url": "https://www.suse.com/security/cve/CVE-2014-8713/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8714 page", "url": "https://www.suse.com/security/cve/CVE-2014-8714/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0559 page", "url": "https://www.suse.com/security/cve/CVE-2015-0559/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0560 page", "url": "https://www.suse.com/security/cve/CVE-2015-0560/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0561 page", "url": "https://www.suse.com/security/cve/CVE-2015-0561/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0562 page", "url": "https://www.suse.com/security/cve/CVE-2015-0562/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0563 page", "url": "https://www.suse.com/security/cve/CVE-2015-0563/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0564 page", "url": "https://www.suse.com/security/cve/CVE-2015-0564/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2188 page", "url": "https://www.suse.com/security/cve/CVE-2015-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2189 page", "url": "https://www.suse.com/security/cve/CVE-2015-2189/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2191 page", "url": "https://www.suse.com/security/cve/CVE-2015-2191/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3811 page", "url": "https://www.suse.com/security/cve/CVE-2015-3811/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3812 page", "url": "https://www.suse.com/security/cve/CVE-2015-3812/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3814 page", "url": "https://www.suse.com/security/cve/CVE-2015-3814/" } ], "title": "Security update for wireshark", "tracking": { "current_release_date": "2014-11-14T12:53:20Z", "generator": { "date": "2014-11-14T12:53:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0653-1", "initial_release_date": "2014-11-14T12:53:20Z", "revision_history": [ { "date": "2014-11-14T12:53:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.i586", "product": { "name": "wireshark-1.10.11-0.2.1.i586", "product_id": "wireshark-1.10.11-0.2.1.i586" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.i586", "product": { "name": "wireshark-devel-1.10.11-0.2.1.i586", "product_id": "wireshark-devel-1.10.11-0.2.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product_id": "wireshark-devel-1.10.11-0.2.1.ia64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-1.10.11-0.2.1.ia64", "product_id": "wireshark-1.10.11-0.2.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product_id": "wireshark-devel-1.10.11-0.2.1.ppc64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-1.10.11-0.2.1.ppc64", "product_id": "wireshark-1.10.11-0.2.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product_id": "wireshark-devel-1.10.11-0.2.1.s390x" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-1.10.11-0.2.1.s390x", "product_id": "wireshark-1.10.11-0.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-1.10.11-0.2.1.x86_64", "product_id": "wireshark-1.10.11-0.2.1.x86_64" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product_id": "wireshark-devel-1.10.11-0.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2486" } ], "notes": [ { "category": "general", "text": "The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2486", "url": "https://www.suse.com/security/cve/CVE-2013-2486" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2486", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-2486" }, { "cve": "CVE-2013-2487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2487" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2487", "url": "https://www.suse.com/security/cve/CVE-2013-2487" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2487", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-2487" }, { "cve": "CVE-2013-3555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3555" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3555", "url": "https://www.suse.com/security/cve/CVE-2013-3555" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3555" }, { "cve": "CVE-2013-3556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3556" } ], "notes": [ { "category": "general", "text": "The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3556", "url": "https://www.suse.com/security/cve/CVE-2013-3556" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3556" }, { "cve": "CVE-2013-3557", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3557" } ], "notes": [ { "category": "general", "text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3557", "url": "https://www.suse.com/security/cve/CVE-2013-3557" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3557" }, { "cve": "CVE-2013-3558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3558" } ], "notes": [ { "category": "general", "text": "The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3558", "url": "https://www.suse.com/security/cve/CVE-2013-3558" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3558" }, { "cve": "CVE-2013-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3559" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3559", "url": "https://www.suse.com/security/cve/CVE-2013-3559" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3559" }, { "cve": "CVE-2013-3560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3560" } ], "notes": [ { "category": "general", "text": "The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3560", "url": "https://www.suse.com/security/cve/CVE-2013-3560" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3560" }, { "cve": "CVE-2013-3561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3561" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3561", "url": "https://www.suse.com/security/cve/CVE-2013-3561" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3561" }, { "cve": "CVE-2013-3562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3562" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3562", "url": "https://www.suse.com/security/cve/CVE-2013-3562" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3562" }, { "cve": "CVE-2013-4074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4074" } ], "notes": [ { "category": "general", "text": "The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4074", "url": "https://www.suse.com/security/cve/CVE-2013-4074" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4074", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4074" }, { "cve": "CVE-2013-4075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4075" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4075", "url": "https://www.suse.com/security/cve/CVE-2013-4075" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4075", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4075", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4075" }, { "cve": "CVE-2013-4076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4076" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4076", "url": "https://www.suse.com/security/cve/CVE-2013-4076" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4076", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4076" }, { "cve": "CVE-2013-4077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4077" } ], "notes": [ { "category": "general", "text": "Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4077", "url": "https://www.suse.com/security/cve/CVE-2013-4077" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4077", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4077" }, { "cve": "CVE-2013-4078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4078" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4078", "url": "https://www.suse.com/security/cve/CVE-2013-4078" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4078", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4078" }, { "cve": "CVE-2013-4079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4079" } ], "notes": [ { "category": "general", "text": "The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4079", "url": "https://www.suse.com/security/cve/CVE-2013-4079" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4079", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4079", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4079" }, { "cve": "CVE-2013-4080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4080" } ], "notes": [ { "category": "general", "text": "The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4080", "url": "https://www.suse.com/security/cve/CVE-2013-4080" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4080", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4080" }, { "cve": "CVE-2013-4081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4081" } ], "notes": [ { "category": "general", "text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4081", "url": "https://www.suse.com/security/cve/CVE-2013-4081" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4081", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836116 for CVE-2013-4081", "url": "https://bugzilla.suse.com/836116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4081" }, { "cve": "CVE-2013-4082", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4082" } ], "notes": [ { "category": "general", "text": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4082", "url": "https://www.suse.com/security/cve/CVE-2013-4082" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4082", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4082" }, { "cve": "CVE-2013-4083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4083" } ], "notes": [ { "category": "general", "text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4083", "url": "https://www.suse.com/security/cve/CVE-2013-4083" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4083", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4083", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4083" }, { "cve": "CVE-2013-4929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4929" } ], "notes": [ { "category": "general", "text": "The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4929", "url": "https://www.suse.com/security/cve/CVE-2013-4929" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4929", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-4929" }, { "cve": "CVE-2013-4930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4930" } ], "notes": [ { "category": "general", "text": "The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4930", "url": "https://www.suse.com/security/cve/CVE-2013-4930" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4930", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4930" }, { "cve": "CVE-2013-4931", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4931" } ], "notes": [ { "category": "general", "text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4931", "url": "https://www.suse.com/security/cve/CVE-2013-4931" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4931", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4931" }, { "cve": "CVE-2013-4932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4932" } ], "notes": [ { "category": "general", "text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4932", "url": "https://www.suse.com/security/cve/CVE-2013-4932" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4932", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4932" }, { "cve": "CVE-2013-4933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4933" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4933", "url": "https://www.suse.com/security/cve/CVE-2013-4933" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4933", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4933" }, { "cve": "CVE-2013-4934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4934" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4934", "url": "https://www.suse.com/security/cve/CVE-2013-4934" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4934", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4934" }, { "cve": "CVE-2013-4935", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4935" } ], "notes": [ { "category": "general", "text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4935", "url": "https://www.suse.com/security/cve/CVE-2013-4935" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4935", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4935" }, { "cve": "CVE-2013-6336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6336" } ], "notes": [ { "category": "general", "text": "The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6336", "url": "https://www.suse.com/security/cve/CVE-2013-6336" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6336", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6336" }, { "cve": "CVE-2013-6337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6337" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6337", "url": "https://www.suse.com/security/cve/CVE-2013-6337" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6337", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6337" }, { "cve": "CVE-2013-6338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6338" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6338", "url": "https://www.suse.com/security/cve/CVE-2013-6338" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6338", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6338" }, { "cve": "CVE-2013-6339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6339" } ], "notes": [ { "category": "general", "text": "The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6339", "url": "https://www.suse.com/security/cve/CVE-2013-6339" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6339", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6339" }, { "cve": "CVE-2013-6340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6340" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6340", "url": "https://www.suse.com/security/cve/CVE-2013-6340" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6340", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6340" }, { "cve": "CVE-2013-7112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7112" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7112", "url": "https://www.suse.com/security/cve/CVE-2013-7112" }, { "category": "external", "summary": "SUSE Bug 856498 for CVE-2013-7112", "url": "https://bugzilla.suse.com/856498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7112" }, { "cve": "CVE-2013-7113", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7113" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7113", "url": "https://www.suse.com/security/cve/CVE-2013-7113" }, { "category": "external", "summary": "SUSE Bug 856495 for CVE-2013-7113", "url": "https://bugzilla.suse.com/856495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-7113" }, { "cve": "CVE-2013-7114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7114" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7114", "url": "https://www.suse.com/security/cve/CVE-2013-7114" }, { "category": "external", "summary": "SUSE Bug 856496 for CVE-2013-7114", "url": "https://bugzilla.suse.com/856496" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7114" }, { "cve": "CVE-2014-2281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2281" } ], "notes": [ { "category": "general", "text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2281", "url": "https://www.suse.com/security/cve/CVE-2014-2281" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2281", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2281" }, { "cve": "CVE-2014-2282", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2282" } ], "notes": [ { "category": "general", "text": "The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2282", "url": "https://www.suse.com/security/cve/CVE-2014-2282" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2282", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2282" }, { "cve": "CVE-2014-2283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2283" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2283", "url": "https://www.suse.com/security/cve/CVE-2014-2283" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2283", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2283" }, { "cve": "CVE-2014-2299", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2299" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2299", "url": "https://www.suse.com/security/cve/CVE-2014-2299" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2299", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "critical" } ], "title": "CVE-2014-2299" }, { "cve": "CVE-2014-6421", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6421" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6421", "url": "https://www.suse.com/security/cve/CVE-2014-6421" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6421", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6421" }, { "cve": "CVE-2014-6422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6422" } ], "notes": [ { "category": "general", "text": "The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6422", "url": "https://www.suse.com/security/cve/CVE-2014-6422" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6422", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6422" }, { "cve": "CVE-2014-6423", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6423" } ], "notes": [ { "category": "general", "text": "The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6423", "url": "https://www.suse.com/security/cve/CVE-2014-6423" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6423", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6423" }, { "cve": "CVE-2014-6424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6424" } ], "notes": [ { "category": "general", "text": "The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6424", "url": "https://www.suse.com/security/cve/CVE-2014-6424" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6424", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6424" }, { "cve": "CVE-2014-6427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6427" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6427", "url": "https://www.suse.com/security/cve/CVE-2014-6427" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6427", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6427" }, { "cve": "CVE-2014-6428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6428" } ], "notes": [ { "category": "general", "text": "The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6428", "url": "https://www.suse.com/security/cve/CVE-2014-6428" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6428", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6428" }, { "cve": "CVE-2014-6429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6429" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6429", "url": "https://www.suse.com/security/cve/CVE-2014-6429" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6429", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6429" }, { "cve": "CVE-2014-6430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6430" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6430", "url": "https://www.suse.com/security/cve/CVE-2014-6430" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6430", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6430" }, { "cve": "CVE-2014-6431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6431" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6431", "url": "https://www.suse.com/security/cve/CVE-2014-6431" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6431", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6431" }, { "cve": "CVE-2014-6432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6432" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6432", "url": "https://www.suse.com/security/cve/CVE-2014-6432" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6432", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6432" }, { "cve": "CVE-2014-8710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8710" } ], "notes": [ { "category": "general", "text": "The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8710", "url": "https://www.suse.com/security/cve/CVE-2014-8710" }, { "category": "external", "summary": "SUSE Bug 905246 for CVE-2014-8710", "url": "https://bugzilla.suse.com/905246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8710" }, { "cve": "CVE-2014-8711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8711" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8711", "url": "https://www.suse.com/security/cve/CVE-2014-8711" }, { "category": "external", "summary": "SUSE Bug 905245 for CVE-2014-8711", "url": "https://bugzilla.suse.com/905245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8711" }, { "cve": "CVE-2014-8712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8712" } ], "notes": [ { "category": "general", "text": "The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8712", "url": "https://www.suse.com/security/cve/CVE-2014-8712" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8712", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8712" }, { "cve": "CVE-2014-8713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8713" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8713", "url": "https://www.suse.com/security/cve/CVE-2014-8713" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8713", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8713" }, { "cve": "CVE-2014-8714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8714" } ], "notes": [ { "category": "general", "text": "The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8714", "url": "https://www.suse.com/security/cve/CVE-2014-8714" }, { "category": "external", "summary": "SUSE Bug 905247 for CVE-2014-8714", "url": "https://bugzilla.suse.com/905247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8714" }, { "cve": "CVE-2015-0559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0559" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0559", "url": "https://www.suse.com/security/cve/CVE-2015-0559" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0559", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0559" }, { "cve": "CVE-2015-0560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0560" } ], "notes": [ { "category": "general", "text": "The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0560", "url": "https://www.suse.com/security/cve/CVE-2015-0560" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0560", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0560" }, { "cve": "CVE-2015-0561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0561" } ], "notes": [ { "category": "general", "text": "asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0561", "url": "https://www.suse.com/security/cve/CVE-2015-0561" }, { "category": "external", "summary": "SUSE Bug 912368 for CVE-2015-0561", "url": "https://bugzilla.suse.com/912368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0561" }, { "cve": "CVE-2015-0562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0562" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0562", "url": "https://www.suse.com/security/cve/CVE-2015-0562" }, { "category": "external", "summary": "SUSE Bug 912369 for CVE-2015-0562", "url": "https://bugzilla.suse.com/912369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0562" }, { "cve": "CVE-2015-0563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0563" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0563", "url": "https://www.suse.com/security/cve/CVE-2015-0563" }, { "category": "external", "summary": "SUSE Bug 912370 for CVE-2015-0563", "url": "https://bugzilla.suse.com/912370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0563" }, { "cve": "CVE-2015-0564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0564" } ], "notes": [ { "category": "general", "text": "Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0564", "url": "https://www.suse.com/security/cve/CVE-2015-0564" }, { "category": "external", "summary": "SUSE Bug 912372 for CVE-2015-0564", "url": "https://bugzilla.suse.com/912372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0564" }, { "cve": "CVE-2015-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2188" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2188", "url": "https://www.suse.com/security/cve/CVE-2015-2188" }, { "category": "external", "summary": "SUSE Bug 920696 for CVE-2015-2188", "url": "https://bugzilla.suse.com/920696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2188" }, { "cve": "CVE-2015-2189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2189" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2189", "url": "https://www.suse.com/security/cve/CVE-2015-2189" }, { "category": "external", "summary": "SUSE Bug 920697 for CVE-2015-2189", "url": "https://bugzilla.suse.com/920697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2189" }, { "cve": "CVE-2015-2191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2191" } ], "notes": [ { "category": "general", "text": "Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2191", "url": "https://www.suse.com/security/cve/CVE-2015-2191" }, { "category": "external", "summary": "SUSE Bug 920699 for CVE-2015-2191", "url": "https://bugzilla.suse.com/920699" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2191" }, { "cve": "CVE-2015-3811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3811" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3811", "url": "https://www.suse.com/security/cve/CVE-2015-3811" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3811" }, { "cve": "CVE-2015-3812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3812" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3812", "url": "https://www.suse.com/security/cve/CVE-2015-3812" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3812" }, { "cve": "CVE-2015-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3814" } ], "notes": [ { "category": "general", "text": "The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3814", "url": "https://www.suse.com/security/cve/CVE-2015-3814" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3814" } ] }
suse-su-2015:0426-1
Vulnerability from csaf_suse
Published
2014-11-14 12:53
Modified
2014-11-14 12:53
Summary
Security update for wireshark
Notes
Title of the patch
Security update for wireshark
Description of the patch
wireshark has been updated to version 1.10.11 to fix five security issues.
These security issues have been fixed:
* SigComp UDVM buffer overflow (CVE-2014-8710).
* AMQP dissector crash (CVE-2014-8711).
* NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
* TN5250 infinite loops (CVE-2014-8714).
This non-security issue has been fixed:
* enable zlib (bnc#899303).
Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
<https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html>
Security Issues:
* CVE-2014-8711
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711>
* CVE-2014-8710
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710>
* CVE-2014-8714
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714>
* CVE-2014-8712
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712>
* CVE-2014-8713
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713>
Patchnames
sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wireshark", "title": "Title of the patch" }, { "category": "description", "text": "\nwireshark has been updated to version 1.10.11 to fix five security issues.\n\nThese security issues have been fixed:\n\n * SigComp UDVM buffer overflow (CVE-2014-8710).\n * AMQP dissector crash (CVE-2014-8711).\n * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).\n * TN5250 infinite loops (CVE-2014-8714).\n\nThis non-security issue has been fixed:\n\n * enable zlib (bnc#899303).\n\nFurther bug fixes and updated protocol support as listed in:\n\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\n\u003chttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\u003e\n\nSecurity Issues:\n\n * CVE-2014-8711\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711\u003e\n * CVE-2014-8710\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710\u003e\n * CVE-2014-8714\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714\u003e\n * CVE-2014-8712\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712\u003e\n * CVE-2014-8713\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0426-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0426-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150426-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0426-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" }, { "category": "self", "summary": "SUSE Bug 813217", "url": "https://bugzilla.suse.com/813217" }, { "category": "self", "summary": "SUSE Bug 816517", "url": "https://bugzilla.suse.com/816517" }, { "category": "self", "summary": "SUSE Bug 816887", "url": "https://bugzilla.suse.com/816887" }, { "category": "self", "summary": "SUSE Bug 820973", "url": "https://bugzilla.suse.com/820973" }, { "category": "self", "summary": "SUSE Bug 824900", "url": "https://bugzilla.suse.com/824900" }, { "category": "self", "summary": "SUSE Bug 831718", "url": "https://bugzilla.suse.com/831718" }, { "category": "self", "summary": "SUSE Bug 839607", "url": "https://bugzilla.suse.com/839607" }, { "category": "self", "summary": "SUSE Bug 848738", "url": "https://bugzilla.suse.com/848738" }, { "category": "self", "summary": "SUSE Bug 855980", "url": "https://bugzilla.suse.com/855980" }, { "category": "self", "summary": "SUSE Bug 856495", "url": "https://bugzilla.suse.com/856495" }, { "category": "self", "summary": "SUSE Bug 856496", "url": "https://bugzilla.suse.com/856496" }, { "category": "self", "summary": "SUSE Bug 856498", "url": "https://bugzilla.suse.com/856498" }, { "category": "self", "summary": "SUSE Bug 867485", "url": "https://bugzilla.suse.com/867485" }, { "category": "self", "summary": "SUSE Bug 889854", "url": "https://bugzilla.suse.com/889854" }, { "category": "self", "summary": "SUSE Bug 889899", "url": "https://bugzilla.suse.com/889899" }, { "category": "self", "summary": "SUSE Bug 889900", "url": "https://bugzilla.suse.com/889900" }, { "category": "self", "summary": "SUSE Bug 889901", "url": "https://bugzilla.suse.com/889901" }, { "category": "self", "summary": "SUSE Bug 889906", "url": "https://bugzilla.suse.com/889906" }, { "category": "self", "summary": "SUSE Bug 897055", "url": "https://bugzilla.suse.com/897055" }, { "category": "self", "summary": "SUSE Bug 899303", "url": "https://bugzilla.suse.com/899303" }, { "category": "self", "summary": "SUSE Bug 905245", "url": "https://bugzilla.suse.com/905245" }, { "category": "self", "summary": "SUSE Bug 905246", "url": "https://bugzilla.suse.com/905246" }, { "category": "self", "summary": "SUSE Bug 905247", "url": "https://bugzilla.suse.com/905247" }, { "category": "self", "summary": "SUSE Bug 905248", "url": "https://bugzilla.suse.com/905248" }, { "category": "self", "summary": "SUSE Bug 912365", "url": "https://bugzilla.suse.com/912365" }, { "category": "self", "summary": "SUSE Bug 912368", "url": "https://bugzilla.suse.com/912368" }, { "category": "self", "summary": "SUSE Bug 912369", "url": "https://bugzilla.suse.com/912369" }, { "category": "self", "summary": "SUSE Bug 912370", "url": "https://bugzilla.suse.com/912370" }, { "category": "self", "summary": "SUSE Bug 912372", "url": "https://bugzilla.suse.com/912372" }, { "category": "self", "summary": "SUSE Bug 920696", "url": "https://bugzilla.suse.com/920696" }, { "category": "self", "summary": "SUSE Bug 920697", "url": "https://bugzilla.suse.com/920697" }, { "category": "self", "summary": "SUSE Bug 920699", "url": "https://bugzilla.suse.com/920699" }, { "category": "self", "summary": "SUSE Bug 930691", "url": "https://bugzilla.suse.com/930691" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2486 page", "url": "https://www.suse.com/security/cve/CVE-2013-2486/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2487 page", "url": "https://www.suse.com/security/cve/CVE-2013-2487/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3555 page", "url": "https://www.suse.com/security/cve/CVE-2013-3555/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3556 page", "url": "https://www.suse.com/security/cve/CVE-2013-3556/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3557 page", "url": "https://www.suse.com/security/cve/CVE-2013-3557/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3558 page", "url": "https://www.suse.com/security/cve/CVE-2013-3558/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3559 page", "url": "https://www.suse.com/security/cve/CVE-2013-3559/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3560 page", "url": "https://www.suse.com/security/cve/CVE-2013-3560/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3561 page", "url": "https://www.suse.com/security/cve/CVE-2013-3561/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3562 page", "url": "https://www.suse.com/security/cve/CVE-2013-3562/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4074 page", "url": "https://www.suse.com/security/cve/CVE-2013-4074/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4075 page", "url": "https://www.suse.com/security/cve/CVE-2013-4075/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4076 page", "url": "https://www.suse.com/security/cve/CVE-2013-4076/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4077 page", "url": "https://www.suse.com/security/cve/CVE-2013-4077/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4078 page", "url": "https://www.suse.com/security/cve/CVE-2013-4078/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4079 page", "url": "https://www.suse.com/security/cve/CVE-2013-4079/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4080 page", "url": "https://www.suse.com/security/cve/CVE-2013-4080/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4081 page", "url": "https://www.suse.com/security/cve/CVE-2013-4081/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4082 page", "url": "https://www.suse.com/security/cve/CVE-2013-4082/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4083 page", "url": "https://www.suse.com/security/cve/CVE-2013-4083/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4929 page", "url": "https://www.suse.com/security/cve/CVE-2013-4929/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4930 page", "url": "https://www.suse.com/security/cve/CVE-2013-4930/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4931 page", "url": "https://www.suse.com/security/cve/CVE-2013-4931/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4932 page", "url": "https://www.suse.com/security/cve/CVE-2013-4932/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4933 page", "url": "https://www.suse.com/security/cve/CVE-2013-4933/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4934 page", "url": "https://www.suse.com/security/cve/CVE-2013-4934/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4935 page", "url": "https://www.suse.com/security/cve/CVE-2013-4935/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6336 page", "url": "https://www.suse.com/security/cve/CVE-2013-6336/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6337 page", "url": "https://www.suse.com/security/cve/CVE-2013-6337/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6338 page", "url": "https://www.suse.com/security/cve/CVE-2013-6338/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6339 page", "url": "https://www.suse.com/security/cve/CVE-2013-6339/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6340 page", "url": "https://www.suse.com/security/cve/CVE-2013-6340/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7112 page", "url": "https://www.suse.com/security/cve/CVE-2013-7112/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7113 page", "url": "https://www.suse.com/security/cve/CVE-2013-7113/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7114 page", "url": "https://www.suse.com/security/cve/CVE-2013-7114/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2281 page", "url": "https://www.suse.com/security/cve/CVE-2014-2281/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2282 page", "url": "https://www.suse.com/security/cve/CVE-2014-2282/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2283 page", "url": "https://www.suse.com/security/cve/CVE-2014-2283/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2299 page", "url": "https://www.suse.com/security/cve/CVE-2014-2299/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6421 page", "url": "https://www.suse.com/security/cve/CVE-2014-6421/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6422 page", "url": "https://www.suse.com/security/cve/CVE-2014-6422/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6423 page", "url": "https://www.suse.com/security/cve/CVE-2014-6423/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6424 page", "url": "https://www.suse.com/security/cve/CVE-2014-6424/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6427 page", "url": "https://www.suse.com/security/cve/CVE-2014-6427/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6428 page", "url": "https://www.suse.com/security/cve/CVE-2014-6428/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6429 page", "url": "https://www.suse.com/security/cve/CVE-2014-6429/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6430 page", "url": "https://www.suse.com/security/cve/CVE-2014-6430/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6431 page", "url": "https://www.suse.com/security/cve/CVE-2014-6431/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6432 page", "url": "https://www.suse.com/security/cve/CVE-2014-6432/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8710 page", "url": "https://www.suse.com/security/cve/CVE-2014-8710/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8711 page", "url": "https://www.suse.com/security/cve/CVE-2014-8711/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8712 page", "url": "https://www.suse.com/security/cve/CVE-2014-8712/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8713 page", "url": "https://www.suse.com/security/cve/CVE-2014-8713/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8714 page", "url": "https://www.suse.com/security/cve/CVE-2014-8714/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0559 page", "url": "https://www.suse.com/security/cve/CVE-2015-0559/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0560 page", "url": "https://www.suse.com/security/cve/CVE-2015-0560/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0561 page", "url": "https://www.suse.com/security/cve/CVE-2015-0561/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0562 page", "url": "https://www.suse.com/security/cve/CVE-2015-0562/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0563 page", "url": "https://www.suse.com/security/cve/CVE-2015-0563/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0564 page", "url": "https://www.suse.com/security/cve/CVE-2015-0564/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2188 page", "url": "https://www.suse.com/security/cve/CVE-2015-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2189 page", "url": "https://www.suse.com/security/cve/CVE-2015-2189/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2191 page", "url": "https://www.suse.com/security/cve/CVE-2015-2191/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3811 page", "url": "https://www.suse.com/security/cve/CVE-2015-3811/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3812 page", "url": "https://www.suse.com/security/cve/CVE-2015-3812/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3814 page", "url": "https://www.suse.com/security/cve/CVE-2015-3814/" } ], "title": "Security update for wireshark", "tracking": { "current_release_date": "2014-11-14T12:53:20Z", "generator": { "date": "2014-11-14T12:53:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0426-1", "initial_release_date": "2014-11-14T12:53:20Z", "revision_history": [ { "date": "2014-11-14T12:53:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.i586", "product": { "name": "wireshark-1.10.11-0.2.1.i586", "product_id": "wireshark-1.10.11-0.2.1.i586" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.i586", "product": { "name": "wireshark-devel-1.10.11-0.2.1.i586", "product_id": "wireshark-devel-1.10.11-0.2.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product_id": "wireshark-devel-1.10.11-0.2.1.ia64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-1.10.11-0.2.1.ia64", "product_id": "wireshark-1.10.11-0.2.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product_id": "wireshark-devel-1.10.11-0.2.1.ppc64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-1.10.11-0.2.1.ppc64", "product_id": "wireshark-1.10.11-0.2.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product_id": "wireshark-devel-1.10.11-0.2.1.s390x" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-1.10.11-0.2.1.s390x", "product_id": "wireshark-1.10.11-0.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-1.10.11-0.2.1.x86_64", "product_id": "wireshark-1.10.11-0.2.1.x86_64" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product_id": "wireshark-devel-1.10.11-0.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2486" } ], "notes": [ { "category": "general", "text": "The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2486", "url": "https://www.suse.com/security/cve/CVE-2013-2486" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2486", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-2486" }, { "cve": "CVE-2013-2487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2487" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2487", "url": "https://www.suse.com/security/cve/CVE-2013-2487" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2487", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-2487" }, { "cve": "CVE-2013-3555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3555" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3555", "url": "https://www.suse.com/security/cve/CVE-2013-3555" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3555" }, { "cve": "CVE-2013-3556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3556" } ], "notes": [ { "category": "general", "text": "The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3556", "url": "https://www.suse.com/security/cve/CVE-2013-3556" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3556" }, { "cve": "CVE-2013-3557", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3557" } ], "notes": [ { "category": "general", "text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3557", "url": "https://www.suse.com/security/cve/CVE-2013-3557" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3557" }, { "cve": "CVE-2013-3558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3558" } ], "notes": [ { "category": "general", "text": "The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3558", "url": "https://www.suse.com/security/cve/CVE-2013-3558" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3558" }, { "cve": "CVE-2013-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3559" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3559", "url": "https://www.suse.com/security/cve/CVE-2013-3559" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3559" }, { "cve": "CVE-2013-3560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3560" } ], "notes": [ { "category": "general", "text": "The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3560", "url": "https://www.suse.com/security/cve/CVE-2013-3560" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3560" }, { "cve": "CVE-2013-3561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3561" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3561", "url": "https://www.suse.com/security/cve/CVE-2013-3561" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3561" }, { "cve": "CVE-2013-3562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3562" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3562", "url": "https://www.suse.com/security/cve/CVE-2013-3562" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3562" }, { "cve": "CVE-2013-4074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4074" } ], "notes": [ { "category": "general", "text": "The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4074", "url": "https://www.suse.com/security/cve/CVE-2013-4074" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4074", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4074" }, { "cve": "CVE-2013-4075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4075" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4075", "url": "https://www.suse.com/security/cve/CVE-2013-4075" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4075", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4075", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4075" }, { "cve": "CVE-2013-4076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4076" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4076", "url": "https://www.suse.com/security/cve/CVE-2013-4076" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4076", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4076" }, { "cve": "CVE-2013-4077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4077" } ], "notes": [ { "category": "general", "text": "Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4077", "url": "https://www.suse.com/security/cve/CVE-2013-4077" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4077", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4077" }, { "cve": "CVE-2013-4078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4078" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4078", "url": "https://www.suse.com/security/cve/CVE-2013-4078" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4078", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4078" }, { "cve": "CVE-2013-4079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4079" } ], "notes": [ { "category": "general", "text": "The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4079", "url": "https://www.suse.com/security/cve/CVE-2013-4079" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4079", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4079", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4079" }, { "cve": "CVE-2013-4080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4080" } ], "notes": [ { "category": "general", "text": "The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4080", "url": "https://www.suse.com/security/cve/CVE-2013-4080" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4080", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4080" }, { "cve": "CVE-2013-4081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4081" } ], "notes": [ { "category": "general", "text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4081", "url": "https://www.suse.com/security/cve/CVE-2013-4081" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4081", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836116 for CVE-2013-4081", "url": "https://bugzilla.suse.com/836116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4081" }, { "cve": "CVE-2013-4082", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4082" } ], "notes": [ { "category": "general", "text": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4082", "url": "https://www.suse.com/security/cve/CVE-2013-4082" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4082", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4082" }, { "cve": "CVE-2013-4083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4083" } ], "notes": [ { "category": "general", "text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4083", "url": "https://www.suse.com/security/cve/CVE-2013-4083" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4083", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4083", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4083" }, { "cve": "CVE-2013-4929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4929" } ], "notes": [ { "category": "general", "text": "The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4929", "url": "https://www.suse.com/security/cve/CVE-2013-4929" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4929", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-4929" }, { "cve": "CVE-2013-4930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4930" } ], "notes": [ { "category": "general", "text": "The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4930", "url": "https://www.suse.com/security/cve/CVE-2013-4930" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4930", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4930" }, { "cve": "CVE-2013-4931", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4931" } ], "notes": [ { "category": "general", "text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4931", "url": "https://www.suse.com/security/cve/CVE-2013-4931" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4931", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4931" }, { "cve": "CVE-2013-4932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4932" } ], "notes": [ { "category": "general", "text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4932", "url": "https://www.suse.com/security/cve/CVE-2013-4932" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4932", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4932" }, { "cve": "CVE-2013-4933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4933" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4933", "url": "https://www.suse.com/security/cve/CVE-2013-4933" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4933", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4933" }, { "cve": "CVE-2013-4934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4934" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4934", "url": "https://www.suse.com/security/cve/CVE-2013-4934" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4934", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4934" }, { "cve": "CVE-2013-4935", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4935" } ], "notes": [ { "category": "general", "text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4935", "url": "https://www.suse.com/security/cve/CVE-2013-4935" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4935", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4935" }, { "cve": "CVE-2013-6336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6336" } ], "notes": [ { "category": "general", "text": "The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6336", "url": "https://www.suse.com/security/cve/CVE-2013-6336" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6336", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6336" }, { "cve": "CVE-2013-6337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6337" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6337", "url": "https://www.suse.com/security/cve/CVE-2013-6337" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6337", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6337" }, { "cve": "CVE-2013-6338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6338" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6338", "url": "https://www.suse.com/security/cve/CVE-2013-6338" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6338", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6338" }, { "cve": "CVE-2013-6339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6339" } ], "notes": [ { "category": "general", "text": "The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6339", "url": "https://www.suse.com/security/cve/CVE-2013-6339" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6339", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6339" }, { "cve": "CVE-2013-6340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6340" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6340", "url": "https://www.suse.com/security/cve/CVE-2013-6340" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6340", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6340" }, { "cve": "CVE-2013-7112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7112" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7112", "url": "https://www.suse.com/security/cve/CVE-2013-7112" }, { "category": "external", "summary": "SUSE Bug 856498 for CVE-2013-7112", "url": "https://bugzilla.suse.com/856498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7112" }, { "cve": "CVE-2013-7113", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7113" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7113", "url": "https://www.suse.com/security/cve/CVE-2013-7113" }, { "category": "external", "summary": "SUSE Bug 856495 for CVE-2013-7113", "url": "https://bugzilla.suse.com/856495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-7113" }, { "cve": "CVE-2013-7114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7114" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7114", "url": "https://www.suse.com/security/cve/CVE-2013-7114" }, { "category": "external", "summary": "SUSE Bug 856496 for CVE-2013-7114", "url": "https://bugzilla.suse.com/856496" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7114" }, { "cve": "CVE-2014-2281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2281" } ], "notes": [ { "category": "general", "text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2281", "url": "https://www.suse.com/security/cve/CVE-2014-2281" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2281", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2281" }, { "cve": "CVE-2014-2282", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2282" } ], "notes": [ { "category": "general", "text": "The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2282", "url": "https://www.suse.com/security/cve/CVE-2014-2282" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2282", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2282" }, { "cve": "CVE-2014-2283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2283" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2283", "url": "https://www.suse.com/security/cve/CVE-2014-2283" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2283", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2283" }, { "cve": "CVE-2014-2299", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2299" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2299", "url": "https://www.suse.com/security/cve/CVE-2014-2299" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2299", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "critical" } ], "title": "CVE-2014-2299" }, { "cve": "CVE-2014-6421", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6421" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6421", "url": "https://www.suse.com/security/cve/CVE-2014-6421" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6421", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6421" }, { "cve": "CVE-2014-6422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6422" } ], "notes": [ { "category": "general", "text": "The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6422", "url": "https://www.suse.com/security/cve/CVE-2014-6422" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6422", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6422" }, { "cve": "CVE-2014-6423", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6423" } ], "notes": [ { "category": "general", "text": "The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6423", "url": "https://www.suse.com/security/cve/CVE-2014-6423" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6423", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6423" }, { "cve": "CVE-2014-6424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6424" } ], "notes": [ { "category": "general", "text": "The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6424", "url": "https://www.suse.com/security/cve/CVE-2014-6424" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6424", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6424" }, { "cve": "CVE-2014-6427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6427" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6427", "url": "https://www.suse.com/security/cve/CVE-2014-6427" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6427", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6427" }, { "cve": "CVE-2014-6428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6428" } ], "notes": [ { "category": "general", "text": "The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6428", "url": "https://www.suse.com/security/cve/CVE-2014-6428" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6428", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6428" }, { "cve": "CVE-2014-6429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6429" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6429", "url": "https://www.suse.com/security/cve/CVE-2014-6429" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6429", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6429" }, { "cve": "CVE-2014-6430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6430" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6430", "url": "https://www.suse.com/security/cve/CVE-2014-6430" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6430", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6430" }, { "cve": "CVE-2014-6431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6431" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6431", "url": "https://www.suse.com/security/cve/CVE-2014-6431" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6431", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6431" }, { "cve": "CVE-2014-6432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6432" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6432", "url": "https://www.suse.com/security/cve/CVE-2014-6432" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6432", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6432" }, { "cve": "CVE-2014-8710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8710" } ], "notes": [ { "category": "general", "text": "The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8710", "url": "https://www.suse.com/security/cve/CVE-2014-8710" }, { "category": "external", "summary": "SUSE Bug 905246 for CVE-2014-8710", "url": "https://bugzilla.suse.com/905246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8710" }, { "cve": "CVE-2014-8711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8711" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8711", "url": "https://www.suse.com/security/cve/CVE-2014-8711" }, { "category": "external", "summary": "SUSE Bug 905245 for CVE-2014-8711", "url": "https://bugzilla.suse.com/905245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8711" }, { "cve": "CVE-2014-8712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8712" } ], "notes": [ { "category": "general", "text": "The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8712", "url": "https://www.suse.com/security/cve/CVE-2014-8712" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8712", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8712" }, { "cve": "CVE-2014-8713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8713" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8713", "url": "https://www.suse.com/security/cve/CVE-2014-8713" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8713", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8713" }, { "cve": "CVE-2014-8714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8714" } ], "notes": [ { "category": "general", "text": "The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8714", "url": "https://www.suse.com/security/cve/CVE-2014-8714" }, { "category": "external", "summary": "SUSE Bug 905247 for CVE-2014-8714", "url": "https://bugzilla.suse.com/905247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8714" }, { "cve": "CVE-2015-0559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0559" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0559", "url": "https://www.suse.com/security/cve/CVE-2015-0559" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0559", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0559" }, { "cve": "CVE-2015-0560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0560" } ], "notes": [ { "category": "general", "text": "The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0560", "url": "https://www.suse.com/security/cve/CVE-2015-0560" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0560", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0560" }, { "cve": "CVE-2015-0561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0561" } ], "notes": [ { "category": "general", "text": "asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0561", "url": "https://www.suse.com/security/cve/CVE-2015-0561" }, { "category": "external", "summary": "SUSE Bug 912368 for CVE-2015-0561", "url": "https://bugzilla.suse.com/912368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0561" }, { "cve": "CVE-2015-0562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0562" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0562", "url": "https://www.suse.com/security/cve/CVE-2015-0562" }, { "category": "external", "summary": "SUSE Bug 912369 for CVE-2015-0562", "url": "https://bugzilla.suse.com/912369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0562" }, { "cve": "CVE-2015-0563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0563" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0563", "url": "https://www.suse.com/security/cve/CVE-2015-0563" }, { "category": "external", "summary": "SUSE Bug 912370 for CVE-2015-0563", "url": "https://bugzilla.suse.com/912370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0563" }, { "cve": "CVE-2015-0564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0564" } ], "notes": [ { "category": "general", "text": "Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0564", "url": "https://www.suse.com/security/cve/CVE-2015-0564" }, { "category": "external", "summary": "SUSE Bug 912372 for CVE-2015-0564", "url": "https://bugzilla.suse.com/912372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0564" }, { "cve": "CVE-2015-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2188" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2188", "url": "https://www.suse.com/security/cve/CVE-2015-2188" }, { "category": "external", "summary": "SUSE Bug 920696 for CVE-2015-2188", "url": "https://bugzilla.suse.com/920696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2188" }, { "cve": "CVE-2015-2189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2189" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2189", "url": "https://www.suse.com/security/cve/CVE-2015-2189" }, { "category": "external", "summary": "SUSE Bug 920697 for CVE-2015-2189", "url": "https://bugzilla.suse.com/920697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2189" }, { "cve": "CVE-2015-2191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2191" } ], "notes": [ { "category": "general", "text": "Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2191", "url": "https://www.suse.com/security/cve/CVE-2015-2191" }, { "category": "external", "summary": "SUSE Bug 920699 for CVE-2015-2191", "url": "https://bugzilla.suse.com/920699" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2191" }, { "cve": "CVE-2015-3811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3811" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3811", "url": "https://www.suse.com/security/cve/CVE-2015-3811" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3811" }, { "cve": "CVE-2015-3812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3812" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3812", "url": "https://www.suse.com/security/cve/CVE-2015-3812" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3812" }, { "cve": "CVE-2015-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3814" } ], "notes": [ { "category": "general", "text": "The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3814", "url": "https://www.suse.com/security/cve/CVE-2015-3814" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3814" } ] }
fkie_cve-2013-4082
Vulnerability from fkie_nvd
Published
2013-06-09 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739&r2=49738&pathrev=49739 | Patch | |
cve@mitre.org | http://anonsvn.wireshark.org/viewvc?view=revision&revision=49739 | Patch | |
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html | Vendor Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/53762 | ||
cve@mitre.org | http://secunia.com/advisories/54425 | ||
cve@mitre.org | http://www.debian.org/security/2013/dsa-2709 | Vendor Advisory | |
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml | ||
cve@mitre.org | http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html | Vendor Advisory | |
cve@mitre.org | http://www.wireshark.org/security/wnpa-sec-2013-40.html | Vendor Advisory | |
cve@mitre.org | https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760 | Patch | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739&r2=49738&pathrev=49739 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://anonsvn.wireshark.org/viewvc?view=revision&revision=49739 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/53762 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/54425 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2709 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wireshark.org/security/wnpa-sec-2013-40.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wireshark | wireshark | 1.8.0 | |
wireshark | wireshark | 1.8.1 | |
wireshark | wireshark | 1.8.2 | |
wireshark | wireshark | 1.8.3 | |
wireshark | wireshark | 1.8.4 | |
wireshark | wireshark | 1.8.5 | |
wireshark | wireshark | 1.8.6 | |
wireshark | wireshark | 1.8.7 | |
debian | debian_linux | 7.0 | |
opensuse | opensuse | 11.4 | |
opensuse | opensuse | 12.2 | |
opensuse | opensuse | 12.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "606DF728-1DA6-4989-B40A-44471CC677DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "F824AE6B-B087-4C69-8F73-7B146920FC3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "6702EAA1-7FBD-4755-B7C2-C2B3A1AFF142", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "AF6D1967-500E-4E96-A6D2-CE17EA839572", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "E8400AD4-ECE9-4810-B559-D4EB03AECC50", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "424B66E9-56F8-4D87-94C6-80F5EA0BD1B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6BD261DB-1794-473F-BAD9-E5B7771288BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "E1007895-7CC2-4C2D-BACB-BAE6DECDB840", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet." }, { "lang": "es", "value": "La funci\u00f3n vwr_read en wiretap/vwr.c en el analizador Ixia IxVeriWave en Wireshark 1.8.x anterior a 1.8.8, no valida la relaci\u00f3n entre el tama\u00f1o de registro el tama\u00f1o del \"trailer\", lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer basado en memoria din\u00e1mica y ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de un paquete manipulado." } ], "id": "CVE-2013-4082", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-09T21:55:01.643", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/53762" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/54425" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/54425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-cr8v-3h28-xr83
Vulnerability from github
Published
2022-05-14 02:10
Modified
2022-05-14 02:10
VLAI Severity ?
Details
The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.
{ "affected": [], "aliases": [ "CVE-2013-4082" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-06-09T21:55:00Z", "severity": "MODERATE" }, "details": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.", "id": "GHSA-cr8v-3h28-xr83", "modified": "2022-05-14T02:10:21Z", "published": "2022-05-14T02:10:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4082" }, { "type": "WEB", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" }, { "type": "WEB", "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "type": "WEB", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/53762" }, { "type": "WEB", "url": "http://secunia.com/advisories/54425" }, { "type": "WEB", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "type": "WEB", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "type": "WEB", "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2013-4082
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2013-4082", "description": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.", "id": "GSD-2013-4082", "references": [ "https://www.suse.com/security/cve/CVE-2013-4082.html", "https://www.debian.org/security/2013/dsa-2709", "https://advisories.mageia.org/CVE-2013-4082.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-4082" ], "details": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.", "id": "GSD-2013-4082", "modified": "2023-12-13T01:22:16.340609Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4082", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-40.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" }, { "name": "oval:org.mitre.oval:def:16886", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4082" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-40.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "name": "DSA-2709", "refsource": "DEBIAN", "tags": [ "Vendor Advisory" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "tags": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "54425", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/54425" }, { "name": "53762", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/53762" }, { "name": "oval:org.mitre.oval:def:16886", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:27Z", "publishedDate": "2013-06-09T21:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…