Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-6421 (GCVE-0-2014-6421)
Vulnerability from cvelistv5
Published
2014-09-20 10:00
Modified
2024-08-06 12:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:17:23.735Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1676" }, { "name": "61933", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61933" }, { "name": "openSUSE-SU-2014:1249", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" }, { "name": "RHSA-2014:1677", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html" }, { "name": "RHSA-2014:1676", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920" }, { "name": "SUSE-SU-2014:1221", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984" }, { "name": "60280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60280" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1677" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2014-12.html" }, { "name": "61929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61929" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-03T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1676" }, { "name": "61933", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61933" }, { "name": "openSUSE-SU-2014:1249", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" }, { "name": "RHSA-2014:1677", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html" }, { "name": "RHSA-2014:1676", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920" }, { "name": "SUSE-SU-2014:1221", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984" }, { "name": "60280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60280" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1677" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2014-12.html" }, { "name": "61929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61929" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6421", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://linux.oracle.com/errata/ELSA-2014-1676", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-1676" }, { "name": "61933", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61933" }, { "name": "openSUSE-SU-2014:1249", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" }, { "name": "RHSA-2014:1677", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html" }, { "name": "RHSA-2014:1676", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920" }, { "name": "SUSE-SU-2014:1221", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" }, { "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=04c05a21e34cec326f1aff2f5f8a6e74e1ced984", "refsource": "CONFIRM", "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=04c05a21e34cec326f1aff2f5f8a6e74e1ced984" }, { "name": "60280", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60280" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1677", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-1677" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2014-12.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2014-12.html" }, { "name": "61929", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61929" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-6421", "datePublished": "2014-09-20T10:00:00", "dateReserved": "2014-09-16T00:00:00", "dateUpdated": "2024-08-06T12:17:23.735Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-6421\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-09-20T10:55:06.137\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en el diseccionador SDP en Wireshark 1.10.x anterior a 1.10.10 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un paquete manipulado que aprovecha la titularidad de la memor\u00eda dividida entre el diseccionador SDP y RTP.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"481435A6-4790-4B3E-8EEA-0394A6AB481A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B0BB28A-9E61-4073-9BE2-C34AB2BCF1EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0753BF56-C829-48C3-AA6E-C0A2A1EA1124\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC206A02-8259-4FA0-8B6F-D8C58AB946C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B973D7E1-523B-4AB9-965F-F8BBD2420CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"633AE75A-89BB-458D-9609-2C238DAC25C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20A8D578-A2DD-4D08-81C1-E4437F40D21D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BBB2FB-A3D3-4D9F-88CB-F3D74395D364\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67E51FE-2B4A-4475-B829-316EDC24B88B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3060B2B7-48CB-4669-BF65-4750D11CA401\"}]}]}],\"references\":[{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1676\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1677\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1676.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1677.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60280\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61929\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61933\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.wireshark.org/security/wnpa-sec-2014-12.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1676\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1677\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1676.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1677.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60280\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61929\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.wireshark.org/security/wnpa-sec-2014-12.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"\u003ca href=\\\"http://cwe.mitre.org/data/definitions/416.html\\\"\u003eCWE-416: Use After Free\u003c/a\u003e\"}}" } }
ghsa-r6wm-v578-w5jm
Vulnerability from github
Published
2022-05-17 04:30
Modified
2025-04-12 12:38
VLAI Severity ?
Details
Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.
{ "affected": [], "aliases": [ "CVE-2014-6421" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-09-20T10:55:00Z", "severity": "MODERATE" }, "details": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "id": "GHSA-r6wm-v578-w5jm", "modified": "2025-04-12T12:38:22Z", "published": "2022-05-17T04:30:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6421" }, { "type": "WEB", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920" }, { "type": "WEB", "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984" }, { "type": "WEB", "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=04c05a21e34cec326f1aff2f5f8a6e74e1ced984" }, { "type": "WEB", "url": "http://linux.oracle.com/errata/ELSA-2014-1676" }, { "type": "WEB", "url": "http://linux.oracle.com/errata/ELSA-2014-1677" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/60280" }, { "type": "WEB", "url": "http://secunia.com/advisories/61929" }, { "type": "WEB", "url": "http://secunia.com/advisories/61933" }, { "type": "WEB", "url": "http://www.wireshark.org/security/wnpa-sec-2014-12.html" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2014-6421
Vulnerability from fkie_nvd
Published
2014-09-20 10:55
Modified
2025-04-12 10:46
Severity ?
Summary
Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://linux.oracle.com/errata/ELSA-2014-1676 | ||
cve@mitre.org | http://linux.oracle.com/errata/ELSA-2014-1677 | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2014-1676.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2014-1677.html | ||
cve@mitre.org | http://secunia.com/advisories/60280 | ||
cve@mitre.org | http://secunia.com/advisories/61929 | ||
cve@mitre.org | http://secunia.com/advisories/61933 | ||
cve@mitre.org | http://www.wireshark.org/security/wnpa-sec-2014-12.html | ||
cve@mitre.org | https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920 | ||
cve@mitre.org | https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://linux.oracle.com/errata/ELSA-2014-1676 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://linux.oracle.com/errata/ELSA-2014-1677 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1676.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1677.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60280 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61929 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61933 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.wireshark.org/security/wnpa-sec-2014-12.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "481435A6-4790-4B3E-8EEA-0394A6AB481A", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B0BB28A-9E61-4073-9BE2-C34AB2BCF1EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "0753BF56-C829-48C3-AA6E-C0A2A1EA1124", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "EC206A02-8259-4FA0-8B6F-D8C58AB946C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "B973D7E1-523B-4AB9-965F-F8BBD2420CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "633AE75A-89BB-458D-9609-2C238DAC25C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "20A8D578-A2DD-4D08-81C1-E4437F40D21D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "C0BBB2FB-A3D3-4D9F-88CB-F3D74395D364", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*", "matchCriteriaId": "A67E51FE-2B4A-4475-B829-316EDC24B88B", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*", "matchCriteriaId": "3060B2B7-48CB-4669-BF65-4750D11CA401", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors." }, { "lang": "es", "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en el diseccionador SDP en Wireshark 1.10.x anterior a 1.10.10 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un paquete manipulado que aprovecha la titularidad de la memor\u00eda dividida entre el diseccionador SDP y RTP." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/416.html\"\u003eCWE-416: Use After Free\u003c/a\u003e", "id": "CVE-2014-6421", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-09-20T10:55:06.137", "references": [ { "source": "cve@mitre.org", "url": "http://linux.oracle.com/errata/ELSA-2014-1676" }, { "source": "cve@mitre.org", "url": "http://linux.oracle.com/errata/ELSA-2014-1677" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/60280" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/61929" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/61933" }, { "source": "cve@mitre.org", "url": "http://www.wireshark.org/security/wnpa-sec-2014-12.html" }, { "source": "cve@mitre.org", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920" }, { "source": "cve@mitre.org", "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://linux.oracle.com/errata/ELSA-2014-1676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://linux.oracle.com/errata/ELSA-2014-1677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.wireshark.org/security/wnpa-sec-2014-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2015:1098-1
Vulnerability from csaf_suse
Published
2014-11-14 12:53
Modified
2014-11-14 12:53
Summary
Security update for wireshark
Notes
Title of the patch
Security update for wireshark
Description of the patch
wireshark has been updated to version 1.10.11 to fix five security issues.
These security issues have been fixed:
* SigComp UDVM buffer overflow (CVE-2014-8710).
* AMQP dissector crash (CVE-2014-8711).
* NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
* TN5250 infinite loops (CVE-2014-8714).
This non-security issue has been fixed:
* enable zlib (bnc#899303).
Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
<https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html>
Security Issues:
* CVE-2014-8711
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711>
* CVE-2014-8710
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710>
* CVE-2014-8714
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714>
* CVE-2014-8712
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712>
* CVE-2014-8713
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713>
Patchnames
sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wireshark", "title": "Title of the patch" }, { "category": "description", "text": "\nwireshark has been updated to version 1.10.11 to fix five security issues.\n\nThese security issues have been fixed:\n\n * SigComp UDVM buffer overflow (CVE-2014-8710).\n * AMQP dissector crash (CVE-2014-8711).\n * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).\n * TN5250 infinite loops (CVE-2014-8714).\n\nThis non-security issue has been fixed:\n\n * enable zlib (bnc#899303).\n\nFurther bug fixes and updated protocol support as listed in:\n\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\n\u003chttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\u003e\n\nSecurity Issues:\n\n * CVE-2014-8711\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711\u003e\n * CVE-2014-8710\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710\u003e\n * CVE-2014-8714\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714\u003e\n * CVE-2014-8712\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712\u003e\n * CVE-2014-8713\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1098-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1098-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151098-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1098-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" }, { "category": "self", "summary": "SUSE Bug 813217", "url": "https://bugzilla.suse.com/813217" }, { "category": "self", "summary": "SUSE Bug 816517", "url": "https://bugzilla.suse.com/816517" }, { "category": "self", "summary": "SUSE Bug 816887", "url": "https://bugzilla.suse.com/816887" }, { "category": "self", "summary": "SUSE Bug 820973", "url": "https://bugzilla.suse.com/820973" }, { "category": "self", "summary": "SUSE Bug 824900", "url": "https://bugzilla.suse.com/824900" }, { "category": "self", "summary": "SUSE Bug 831718", "url": "https://bugzilla.suse.com/831718" }, { "category": "self", "summary": "SUSE Bug 839607", "url": "https://bugzilla.suse.com/839607" }, { "category": "self", "summary": "SUSE Bug 848738", "url": "https://bugzilla.suse.com/848738" }, { "category": "self", "summary": "SUSE Bug 855980", "url": "https://bugzilla.suse.com/855980" }, { "category": "self", "summary": "SUSE Bug 856495", "url": "https://bugzilla.suse.com/856495" }, { "category": "self", "summary": "SUSE Bug 856496", "url": "https://bugzilla.suse.com/856496" }, { "category": "self", "summary": "SUSE Bug 856498", "url": "https://bugzilla.suse.com/856498" }, { "category": "self", "summary": "SUSE Bug 867485", "url": "https://bugzilla.suse.com/867485" }, { "category": "self", "summary": "SUSE Bug 889854", "url": "https://bugzilla.suse.com/889854" }, { "category": "self", "summary": "SUSE Bug 889899", "url": "https://bugzilla.suse.com/889899" }, { "category": "self", "summary": "SUSE Bug 889900", "url": "https://bugzilla.suse.com/889900" }, { "category": "self", "summary": "SUSE Bug 889901", "url": "https://bugzilla.suse.com/889901" }, { "category": "self", "summary": "SUSE Bug 889906", "url": "https://bugzilla.suse.com/889906" }, { "category": "self", "summary": "SUSE Bug 897055", "url": "https://bugzilla.suse.com/897055" }, { "category": "self", "summary": "SUSE Bug 899303", "url": "https://bugzilla.suse.com/899303" }, { "category": "self", "summary": "SUSE Bug 905245", "url": "https://bugzilla.suse.com/905245" }, { "category": "self", "summary": "SUSE Bug 905246", "url": "https://bugzilla.suse.com/905246" }, { "category": "self", "summary": "SUSE Bug 905247", "url": "https://bugzilla.suse.com/905247" }, { "category": "self", "summary": "SUSE Bug 905248", "url": "https://bugzilla.suse.com/905248" }, { "category": "self", "summary": "SUSE Bug 912365", "url": "https://bugzilla.suse.com/912365" }, { "category": "self", "summary": "SUSE Bug 912368", "url": "https://bugzilla.suse.com/912368" }, { "category": "self", "summary": "SUSE Bug 912369", "url": "https://bugzilla.suse.com/912369" }, { "category": "self", "summary": "SUSE Bug 912370", "url": "https://bugzilla.suse.com/912370" }, { "category": "self", "summary": "SUSE Bug 912372", "url": "https://bugzilla.suse.com/912372" }, { "category": "self", "summary": "SUSE Bug 920696", "url": "https://bugzilla.suse.com/920696" }, { "category": "self", "summary": "SUSE Bug 920697", "url": "https://bugzilla.suse.com/920697" }, { "category": "self", "summary": "SUSE Bug 920699", "url": "https://bugzilla.suse.com/920699" }, { "category": "self", "summary": "SUSE Bug 930691", "url": "https://bugzilla.suse.com/930691" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2486 page", "url": "https://www.suse.com/security/cve/CVE-2013-2486/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2487 page", "url": "https://www.suse.com/security/cve/CVE-2013-2487/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3555 page", "url": "https://www.suse.com/security/cve/CVE-2013-3555/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3556 page", "url": "https://www.suse.com/security/cve/CVE-2013-3556/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3557 page", "url": "https://www.suse.com/security/cve/CVE-2013-3557/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3558 page", "url": "https://www.suse.com/security/cve/CVE-2013-3558/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3559 page", "url": "https://www.suse.com/security/cve/CVE-2013-3559/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3560 page", "url": "https://www.suse.com/security/cve/CVE-2013-3560/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3561 page", "url": "https://www.suse.com/security/cve/CVE-2013-3561/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3562 page", "url": "https://www.suse.com/security/cve/CVE-2013-3562/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4074 page", "url": "https://www.suse.com/security/cve/CVE-2013-4074/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4075 page", "url": "https://www.suse.com/security/cve/CVE-2013-4075/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4076 page", "url": "https://www.suse.com/security/cve/CVE-2013-4076/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4077 page", "url": "https://www.suse.com/security/cve/CVE-2013-4077/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4078 page", "url": "https://www.suse.com/security/cve/CVE-2013-4078/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4079 page", "url": "https://www.suse.com/security/cve/CVE-2013-4079/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4080 page", "url": "https://www.suse.com/security/cve/CVE-2013-4080/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4081 page", "url": "https://www.suse.com/security/cve/CVE-2013-4081/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4082 page", "url": "https://www.suse.com/security/cve/CVE-2013-4082/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4083 page", "url": "https://www.suse.com/security/cve/CVE-2013-4083/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4929 page", "url": "https://www.suse.com/security/cve/CVE-2013-4929/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4930 page", "url": "https://www.suse.com/security/cve/CVE-2013-4930/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4931 page", "url": "https://www.suse.com/security/cve/CVE-2013-4931/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4932 page", "url": "https://www.suse.com/security/cve/CVE-2013-4932/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4933 page", "url": "https://www.suse.com/security/cve/CVE-2013-4933/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4934 page", "url": "https://www.suse.com/security/cve/CVE-2013-4934/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4935 page", "url": "https://www.suse.com/security/cve/CVE-2013-4935/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6336 page", "url": "https://www.suse.com/security/cve/CVE-2013-6336/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6337 page", "url": "https://www.suse.com/security/cve/CVE-2013-6337/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6338 page", "url": "https://www.suse.com/security/cve/CVE-2013-6338/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6339 page", "url": "https://www.suse.com/security/cve/CVE-2013-6339/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6340 page", "url": "https://www.suse.com/security/cve/CVE-2013-6340/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7112 page", "url": "https://www.suse.com/security/cve/CVE-2013-7112/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7113 page", "url": "https://www.suse.com/security/cve/CVE-2013-7113/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7114 page", "url": "https://www.suse.com/security/cve/CVE-2013-7114/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2281 page", "url": "https://www.suse.com/security/cve/CVE-2014-2281/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2282 page", "url": "https://www.suse.com/security/cve/CVE-2014-2282/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2283 page", "url": "https://www.suse.com/security/cve/CVE-2014-2283/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2299 page", "url": "https://www.suse.com/security/cve/CVE-2014-2299/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6421 page", "url": "https://www.suse.com/security/cve/CVE-2014-6421/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6422 page", "url": "https://www.suse.com/security/cve/CVE-2014-6422/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6423 page", "url": "https://www.suse.com/security/cve/CVE-2014-6423/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6424 page", "url": "https://www.suse.com/security/cve/CVE-2014-6424/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6427 page", "url": "https://www.suse.com/security/cve/CVE-2014-6427/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6428 page", "url": "https://www.suse.com/security/cve/CVE-2014-6428/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6429 page", "url": "https://www.suse.com/security/cve/CVE-2014-6429/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6430 page", "url": "https://www.suse.com/security/cve/CVE-2014-6430/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6431 page", "url": "https://www.suse.com/security/cve/CVE-2014-6431/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6432 page", "url": "https://www.suse.com/security/cve/CVE-2014-6432/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8710 page", "url": "https://www.suse.com/security/cve/CVE-2014-8710/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8711 page", "url": "https://www.suse.com/security/cve/CVE-2014-8711/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8712 page", "url": "https://www.suse.com/security/cve/CVE-2014-8712/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8713 page", "url": "https://www.suse.com/security/cve/CVE-2014-8713/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8714 page", "url": "https://www.suse.com/security/cve/CVE-2014-8714/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0559 page", "url": "https://www.suse.com/security/cve/CVE-2015-0559/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0560 page", "url": "https://www.suse.com/security/cve/CVE-2015-0560/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0561 page", "url": "https://www.suse.com/security/cve/CVE-2015-0561/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0562 page", "url": "https://www.suse.com/security/cve/CVE-2015-0562/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0563 page", "url": "https://www.suse.com/security/cve/CVE-2015-0563/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0564 page", "url": "https://www.suse.com/security/cve/CVE-2015-0564/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2188 page", "url": "https://www.suse.com/security/cve/CVE-2015-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2189 page", "url": "https://www.suse.com/security/cve/CVE-2015-2189/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2191 page", "url": "https://www.suse.com/security/cve/CVE-2015-2191/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3811 page", "url": "https://www.suse.com/security/cve/CVE-2015-3811/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3812 page", "url": "https://www.suse.com/security/cve/CVE-2015-3812/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3814 page", "url": "https://www.suse.com/security/cve/CVE-2015-3814/" } ], "title": "Security update for wireshark", "tracking": { "current_release_date": "2014-11-14T12:53:20Z", "generator": { "date": "2014-11-14T12:53:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1098-1", "initial_release_date": "2014-11-14T12:53:20Z", "revision_history": [ { "date": "2014-11-14T12:53:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.i586", "product": { "name": "wireshark-1.10.11-0.2.1.i586", "product_id": "wireshark-1.10.11-0.2.1.i586" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.i586", "product": { "name": "wireshark-devel-1.10.11-0.2.1.i586", "product_id": "wireshark-devel-1.10.11-0.2.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product_id": "wireshark-devel-1.10.11-0.2.1.ia64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-1.10.11-0.2.1.ia64", "product_id": "wireshark-1.10.11-0.2.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product_id": "wireshark-devel-1.10.11-0.2.1.ppc64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-1.10.11-0.2.1.ppc64", "product_id": "wireshark-1.10.11-0.2.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product_id": "wireshark-devel-1.10.11-0.2.1.s390x" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-1.10.11-0.2.1.s390x", "product_id": "wireshark-1.10.11-0.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-1.10.11-0.2.1.x86_64", "product_id": "wireshark-1.10.11-0.2.1.x86_64" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product_id": "wireshark-devel-1.10.11-0.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2486" } ], "notes": [ { "category": "general", "text": "The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2486", "url": "https://www.suse.com/security/cve/CVE-2013-2486" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2486", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-2486" }, { "cve": "CVE-2013-2487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2487" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2487", "url": "https://www.suse.com/security/cve/CVE-2013-2487" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2487", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-2487" }, { "cve": "CVE-2013-3555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3555" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3555", "url": "https://www.suse.com/security/cve/CVE-2013-3555" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3555" }, { "cve": "CVE-2013-3556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3556" } ], "notes": [ { "category": "general", "text": "The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3556", "url": "https://www.suse.com/security/cve/CVE-2013-3556" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3556" }, { "cve": "CVE-2013-3557", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3557" } ], "notes": [ { "category": "general", "text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3557", "url": "https://www.suse.com/security/cve/CVE-2013-3557" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3557" }, { "cve": "CVE-2013-3558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3558" } ], "notes": [ { "category": "general", "text": "The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3558", "url": "https://www.suse.com/security/cve/CVE-2013-3558" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3558" }, { "cve": "CVE-2013-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3559" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3559", "url": "https://www.suse.com/security/cve/CVE-2013-3559" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3559" }, { "cve": "CVE-2013-3560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3560" } ], "notes": [ { "category": "general", "text": "The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3560", "url": "https://www.suse.com/security/cve/CVE-2013-3560" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3560" }, { "cve": "CVE-2013-3561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3561" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3561", "url": "https://www.suse.com/security/cve/CVE-2013-3561" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3561" }, { "cve": "CVE-2013-3562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3562" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3562", "url": "https://www.suse.com/security/cve/CVE-2013-3562" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3562" }, { "cve": "CVE-2013-4074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4074" } ], "notes": [ { "category": "general", "text": "The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4074", "url": "https://www.suse.com/security/cve/CVE-2013-4074" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4074", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4074" }, { "cve": "CVE-2013-4075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4075" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4075", "url": "https://www.suse.com/security/cve/CVE-2013-4075" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4075", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4075", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4075" }, { "cve": "CVE-2013-4076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4076" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4076", "url": "https://www.suse.com/security/cve/CVE-2013-4076" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4076", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4076" }, { "cve": "CVE-2013-4077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4077" } ], "notes": [ { "category": "general", "text": "Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4077", "url": "https://www.suse.com/security/cve/CVE-2013-4077" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4077", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4077" }, { "cve": "CVE-2013-4078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4078" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4078", "url": "https://www.suse.com/security/cve/CVE-2013-4078" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4078", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4078" }, { "cve": "CVE-2013-4079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4079" } ], "notes": [ { "category": "general", "text": "The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4079", "url": "https://www.suse.com/security/cve/CVE-2013-4079" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4079", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4079", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4079" }, { "cve": "CVE-2013-4080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4080" } ], "notes": [ { "category": "general", "text": "The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4080", "url": "https://www.suse.com/security/cve/CVE-2013-4080" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4080", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4080" }, { "cve": "CVE-2013-4081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4081" } ], "notes": [ { "category": "general", "text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4081", "url": "https://www.suse.com/security/cve/CVE-2013-4081" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4081", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836116 for CVE-2013-4081", "url": "https://bugzilla.suse.com/836116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4081" }, { "cve": "CVE-2013-4082", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4082" } ], "notes": [ { "category": "general", "text": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4082", "url": "https://www.suse.com/security/cve/CVE-2013-4082" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4082", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4082" }, { "cve": "CVE-2013-4083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4083" } ], "notes": [ { "category": "general", "text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4083", "url": "https://www.suse.com/security/cve/CVE-2013-4083" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4083", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4083", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4083" }, { "cve": "CVE-2013-4929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4929" } ], "notes": [ { "category": "general", "text": "The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4929", "url": "https://www.suse.com/security/cve/CVE-2013-4929" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4929", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-4929" }, { "cve": "CVE-2013-4930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4930" } ], "notes": [ { "category": "general", "text": "The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4930", "url": "https://www.suse.com/security/cve/CVE-2013-4930" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4930", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4930" }, { "cve": "CVE-2013-4931", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4931" } ], "notes": [ { "category": "general", "text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4931", "url": "https://www.suse.com/security/cve/CVE-2013-4931" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4931", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4931" }, { "cve": "CVE-2013-4932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4932" } ], "notes": [ { "category": "general", "text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4932", "url": "https://www.suse.com/security/cve/CVE-2013-4932" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4932", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4932" }, { "cve": "CVE-2013-4933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4933" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4933", "url": "https://www.suse.com/security/cve/CVE-2013-4933" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4933", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4933" }, { "cve": "CVE-2013-4934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4934" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4934", "url": "https://www.suse.com/security/cve/CVE-2013-4934" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4934", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4934" }, { "cve": "CVE-2013-4935", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4935" } ], "notes": [ { "category": "general", "text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4935", "url": "https://www.suse.com/security/cve/CVE-2013-4935" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4935", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4935" }, { "cve": "CVE-2013-6336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6336" } ], "notes": [ { "category": "general", "text": "The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6336", "url": "https://www.suse.com/security/cve/CVE-2013-6336" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6336", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6336" }, { "cve": "CVE-2013-6337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6337" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6337", "url": "https://www.suse.com/security/cve/CVE-2013-6337" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6337", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6337" }, { "cve": "CVE-2013-6338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6338" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6338", "url": "https://www.suse.com/security/cve/CVE-2013-6338" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6338", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6338" }, { "cve": "CVE-2013-6339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6339" } ], "notes": [ { "category": "general", "text": "The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6339", "url": "https://www.suse.com/security/cve/CVE-2013-6339" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6339", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6339" }, { "cve": "CVE-2013-6340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6340" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6340", "url": "https://www.suse.com/security/cve/CVE-2013-6340" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6340", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6340" }, { "cve": "CVE-2013-7112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7112" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7112", "url": "https://www.suse.com/security/cve/CVE-2013-7112" }, { "category": "external", "summary": "SUSE Bug 856498 for CVE-2013-7112", "url": "https://bugzilla.suse.com/856498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7112" }, { "cve": "CVE-2013-7113", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7113" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7113", "url": "https://www.suse.com/security/cve/CVE-2013-7113" }, { "category": "external", "summary": "SUSE Bug 856495 for CVE-2013-7113", "url": "https://bugzilla.suse.com/856495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-7113" }, { "cve": "CVE-2013-7114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7114" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7114", "url": "https://www.suse.com/security/cve/CVE-2013-7114" }, { "category": "external", "summary": "SUSE Bug 856496 for CVE-2013-7114", "url": "https://bugzilla.suse.com/856496" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7114" }, { "cve": "CVE-2014-2281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2281" } ], "notes": [ { "category": "general", "text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2281", "url": "https://www.suse.com/security/cve/CVE-2014-2281" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2281", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2281" }, { "cve": "CVE-2014-2282", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2282" } ], "notes": [ { "category": "general", "text": "The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2282", "url": "https://www.suse.com/security/cve/CVE-2014-2282" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2282", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2282" }, { "cve": "CVE-2014-2283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2283" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2283", "url": "https://www.suse.com/security/cve/CVE-2014-2283" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2283", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2283" }, { "cve": "CVE-2014-2299", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2299" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2299", "url": "https://www.suse.com/security/cve/CVE-2014-2299" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2299", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "critical" } ], "title": "CVE-2014-2299" }, { "cve": "CVE-2014-6421", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6421" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6421", "url": "https://www.suse.com/security/cve/CVE-2014-6421" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6421", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6421" }, { "cve": "CVE-2014-6422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6422" } ], "notes": [ { "category": "general", "text": "The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6422", "url": "https://www.suse.com/security/cve/CVE-2014-6422" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6422", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6422" }, { "cve": "CVE-2014-6423", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6423" } ], "notes": [ { "category": "general", "text": "The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6423", "url": "https://www.suse.com/security/cve/CVE-2014-6423" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6423", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6423" }, { "cve": "CVE-2014-6424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6424" } ], "notes": [ { "category": "general", "text": "The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6424", "url": "https://www.suse.com/security/cve/CVE-2014-6424" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6424", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6424" }, { "cve": "CVE-2014-6427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6427" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6427", "url": "https://www.suse.com/security/cve/CVE-2014-6427" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6427", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6427" }, { "cve": "CVE-2014-6428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6428" } ], "notes": [ { "category": "general", "text": "The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6428", "url": "https://www.suse.com/security/cve/CVE-2014-6428" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6428", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6428" }, { "cve": "CVE-2014-6429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6429" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6429", "url": "https://www.suse.com/security/cve/CVE-2014-6429" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6429", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6429" }, { "cve": "CVE-2014-6430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6430" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6430", "url": "https://www.suse.com/security/cve/CVE-2014-6430" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6430", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6430" }, { "cve": "CVE-2014-6431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6431" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6431", "url": "https://www.suse.com/security/cve/CVE-2014-6431" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6431", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6431" }, { "cve": "CVE-2014-6432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6432" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6432", "url": "https://www.suse.com/security/cve/CVE-2014-6432" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6432", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6432" }, { "cve": "CVE-2014-8710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8710" } ], "notes": [ { "category": "general", "text": "The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8710", "url": "https://www.suse.com/security/cve/CVE-2014-8710" }, { "category": "external", "summary": "SUSE Bug 905246 for CVE-2014-8710", "url": "https://bugzilla.suse.com/905246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8710" }, { "cve": "CVE-2014-8711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8711" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8711", "url": "https://www.suse.com/security/cve/CVE-2014-8711" }, { "category": "external", "summary": "SUSE Bug 905245 for CVE-2014-8711", "url": "https://bugzilla.suse.com/905245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8711" }, { "cve": "CVE-2014-8712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8712" } ], "notes": [ { "category": "general", "text": "The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8712", "url": "https://www.suse.com/security/cve/CVE-2014-8712" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8712", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8712" }, { "cve": "CVE-2014-8713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8713" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8713", "url": "https://www.suse.com/security/cve/CVE-2014-8713" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8713", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8713" }, { "cve": "CVE-2014-8714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8714" } ], "notes": [ { "category": "general", "text": "The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8714", "url": "https://www.suse.com/security/cve/CVE-2014-8714" }, { "category": "external", "summary": "SUSE Bug 905247 for CVE-2014-8714", "url": "https://bugzilla.suse.com/905247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8714" }, { "cve": "CVE-2015-0559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0559" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0559", "url": "https://www.suse.com/security/cve/CVE-2015-0559" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0559", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0559" }, { "cve": "CVE-2015-0560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0560" } ], "notes": [ { "category": "general", "text": "The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0560", "url": "https://www.suse.com/security/cve/CVE-2015-0560" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0560", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0560" }, { "cve": "CVE-2015-0561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0561" } ], "notes": [ { "category": "general", "text": "asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0561", "url": "https://www.suse.com/security/cve/CVE-2015-0561" }, { "category": "external", "summary": "SUSE Bug 912368 for CVE-2015-0561", "url": "https://bugzilla.suse.com/912368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0561" }, { "cve": "CVE-2015-0562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0562" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0562", "url": "https://www.suse.com/security/cve/CVE-2015-0562" }, { "category": "external", "summary": "SUSE Bug 912369 for CVE-2015-0562", "url": "https://bugzilla.suse.com/912369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0562" }, { "cve": "CVE-2015-0563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0563" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0563", "url": "https://www.suse.com/security/cve/CVE-2015-0563" }, { "category": "external", "summary": "SUSE Bug 912370 for CVE-2015-0563", "url": "https://bugzilla.suse.com/912370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0563" }, { "cve": "CVE-2015-0564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0564" } ], "notes": [ { "category": "general", "text": "Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0564", "url": "https://www.suse.com/security/cve/CVE-2015-0564" }, { "category": "external", "summary": "SUSE Bug 912372 for CVE-2015-0564", "url": "https://bugzilla.suse.com/912372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0564" }, { "cve": "CVE-2015-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2188" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2188", "url": "https://www.suse.com/security/cve/CVE-2015-2188" }, { "category": "external", "summary": "SUSE Bug 920696 for CVE-2015-2188", "url": "https://bugzilla.suse.com/920696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2188" }, { "cve": "CVE-2015-2189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2189" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2189", "url": "https://www.suse.com/security/cve/CVE-2015-2189" }, { "category": "external", "summary": "SUSE Bug 920697 for CVE-2015-2189", "url": "https://bugzilla.suse.com/920697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2189" }, { "cve": "CVE-2015-2191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2191" } ], "notes": [ { "category": "general", "text": "Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2191", "url": "https://www.suse.com/security/cve/CVE-2015-2191" }, { "category": "external", "summary": "SUSE Bug 920699 for CVE-2015-2191", "url": "https://bugzilla.suse.com/920699" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2191" }, { "cve": "CVE-2015-3811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3811" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3811", "url": "https://www.suse.com/security/cve/CVE-2015-3811" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3811" }, { "cve": "CVE-2015-3812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3812" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3812", "url": "https://www.suse.com/security/cve/CVE-2015-3812" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3812" }, { "cve": "CVE-2015-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3814" } ], "notes": [ { "category": "general", "text": "The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3814", "url": "https://www.suse.com/security/cve/CVE-2015-3814" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3814" } ] }
suse-su-2015:0426-1
Vulnerability from csaf_suse
Published
2014-11-14 12:53
Modified
2014-11-14 12:53
Summary
Security update for wireshark
Notes
Title of the patch
Security update for wireshark
Description of the patch
wireshark has been updated to version 1.10.11 to fix five security issues.
These security issues have been fixed:
* SigComp UDVM buffer overflow (CVE-2014-8710).
* AMQP dissector crash (CVE-2014-8711).
* NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
* TN5250 infinite loops (CVE-2014-8714).
This non-security issue has been fixed:
* enable zlib (bnc#899303).
Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
<https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html>
Security Issues:
* CVE-2014-8711
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711>
* CVE-2014-8710
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710>
* CVE-2014-8714
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714>
* CVE-2014-8712
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712>
* CVE-2014-8713
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713>
Patchnames
sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wireshark", "title": "Title of the patch" }, { "category": "description", "text": "\nwireshark has been updated to version 1.10.11 to fix five security issues.\n\nThese security issues have been fixed:\n\n * SigComp UDVM buffer overflow (CVE-2014-8710).\n * AMQP dissector crash (CVE-2014-8711).\n * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).\n * TN5250 infinite loops (CVE-2014-8714).\n\nThis non-security issue has been fixed:\n\n * enable zlib (bnc#899303).\n\nFurther bug fixes and updated protocol support as listed in:\n\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\n\u003chttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\u003e\n\nSecurity Issues:\n\n * CVE-2014-8711\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711\u003e\n * CVE-2014-8710\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710\u003e\n * CVE-2014-8714\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714\u003e\n * CVE-2014-8712\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712\u003e\n * CVE-2014-8713\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0426-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0426-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150426-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0426-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" }, { "category": "self", "summary": "SUSE Bug 813217", "url": "https://bugzilla.suse.com/813217" }, { "category": "self", "summary": "SUSE Bug 816517", "url": "https://bugzilla.suse.com/816517" }, { "category": "self", "summary": "SUSE Bug 816887", "url": "https://bugzilla.suse.com/816887" }, { "category": "self", "summary": "SUSE Bug 820973", "url": "https://bugzilla.suse.com/820973" }, { "category": "self", "summary": "SUSE Bug 824900", "url": "https://bugzilla.suse.com/824900" }, { "category": "self", "summary": "SUSE Bug 831718", "url": "https://bugzilla.suse.com/831718" }, { "category": "self", "summary": "SUSE Bug 839607", "url": "https://bugzilla.suse.com/839607" }, { "category": "self", "summary": "SUSE Bug 848738", "url": "https://bugzilla.suse.com/848738" }, { "category": "self", "summary": "SUSE Bug 855980", "url": "https://bugzilla.suse.com/855980" }, { "category": "self", "summary": "SUSE Bug 856495", "url": "https://bugzilla.suse.com/856495" }, { "category": "self", "summary": "SUSE Bug 856496", "url": "https://bugzilla.suse.com/856496" }, { "category": "self", "summary": "SUSE Bug 856498", "url": "https://bugzilla.suse.com/856498" }, { "category": "self", "summary": "SUSE Bug 867485", "url": "https://bugzilla.suse.com/867485" }, { "category": "self", "summary": "SUSE Bug 889854", "url": "https://bugzilla.suse.com/889854" }, { "category": "self", "summary": "SUSE Bug 889899", "url": "https://bugzilla.suse.com/889899" }, { "category": "self", "summary": "SUSE Bug 889900", "url": "https://bugzilla.suse.com/889900" }, { "category": "self", "summary": "SUSE Bug 889901", "url": "https://bugzilla.suse.com/889901" }, { "category": "self", "summary": "SUSE Bug 889906", "url": "https://bugzilla.suse.com/889906" }, { "category": "self", "summary": "SUSE Bug 897055", "url": "https://bugzilla.suse.com/897055" }, { "category": "self", "summary": "SUSE Bug 899303", "url": "https://bugzilla.suse.com/899303" }, { "category": "self", "summary": "SUSE Bug 905245", "url": "https://bugzilla.suse.com/905245" }, { "category": "self", "summary": "SUSE Bug 905246", "url": "https://bugzilla.suse.com/905246" }, { "category": "self", "summary": "SUSE Bug 905247", "url": "https://bugzilla.suse.com/905247" }, { "category": "self", "summary": "SUSE Bug 905248", "url": "https://bugzilla.suse.com/905248" }, { "category": "self", "summary": "SUSE Bug 912365", "url": "https://bugzilla.suse.com/912365" }, { "category": "self", "summary": "SUSE Bug 912368", "url": "https://bugzilla.suse.com/912368" }, { "category": "self", "summary": "SUSE Bug 912369", "url": "https://bugzilla.suse.com/912369" }, { "category": "self", "summary": "SUSE Bug 912370", "url": "https://bugzilla.suse.com/912370" }, { "category": "self", "summary": "SUSE Bug 912372", "url": "https://bugzilla.suse.com/912372" }, { "category": "self", "summary": "SUSE Bug 920696", "url": "https://bugzilla.suse.com/920696" }, { "category": "self", "summary": "SUSE Bug 920697", "url": "https://bugzilla.suse.com/920697" }, { "category": "self", "summary": "SUSE Bug 920699", "url": "https://bugzilla.suse.com/920699" }, { "category": "self", "summary": "SUSE Bug 930691", "url": "https://bugzilla.suse.com/930691" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2486 page", "url": "https://www.suse.com/security/cve/CVE-2013-2486/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2487 page", "url": "https://www.suse.com/security/cve/CVE-2013-2487/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3555 page", "url": "https://www.suse.com/security/cve/CVE-2013-3555/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3556 page", "url": "https://www.suse.com/security/cve/CVE-2013-3556/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3557 page", "url": "https://www.suse.com/security/cve/CVE-2013-3557/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3558 page", "url": "https://www.suse.com/security/cve/CVE-2013-3558/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3559 page", "url": "https://www.suse.com/security/cve/CVE-2013-3559/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3560 page", "url": "https://www.suse.com/security/cve/CVE-2013-3560/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3561 page", "url": "https://www.suse.com/security/cve/CVE-2013-3561/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3562 page", "url": "https://www.suse.com/security/cve/CVE-2013-3562/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4074 page", "url": "https://www.suse.com/security/cve/CVE-2013-4074/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4075 page", "url": "https://www.suse.com/security/cve/CVE-2013-4075/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4076 page", "url": "https://www.suse.com/security/cve/CVE-2013-4076/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4077 page", "url": "https://www.suse.com/security/cve/CVE-2013-4077/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4078 page", "url": "https://www.suse.com/security/cve/CVE-2013-4078/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4079 page", "url": "https://www.suse.com/security/cve/CVE-2013-4079/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4080 page", "url": "https://www.suse.com/security/cve/CVE-2013-4080/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4081 page", "url": "https://www.suse.com/security/cve/CVE-2013-4081/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4082 page", "url": "https://www.suse.com/security/cve/CVE-2013-4082/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4083 page", "url": "https://www.suse.com/security/cve/CVE-2013-4083/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4929 page", "url": "https://www.suse.com/security/cve/CVE-2013-4929/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4930 page", "url": "https://www.suse.com/security/cve/CVE-2013-4930/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4931 page", "url": "https://www.suse.com/security/cve/CVE-2013-4931/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4932 page", "url": "https://www.suse.com/security/cve/CVE-2013-4932/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4933 page", "url": "https://www.suse.com/security/cve/CVE-2013-4933/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4934 page", "url": "https://www.suse.com/security/cve/CVE-2013-4934/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4935 page", "url": "https://www.suse.com/security/cve/CVE-2013-4935/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6336 page", "url": "https://www.suse.com/security/cve/CVE-2013-6336/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6337 page", "url": "https://www.suse.com/security/cve/CVE-2013-6337/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6338 page", "url": "https://www.suse.com/security/cve/CVE-2013-6338/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6339 page", "url": "https://www.suse.com/security/cve/CVE-2013-6339/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6340 page", "url": "https://www.suse.com/security/cve/CVE-2013-6340/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7112 page", "url": "https://www.suse.com/security/cve/CVE-2013-7112/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7113 page", "url": "https://www.suse.com/security/cve/CVE-2013-7113/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7114 page", "url": "https://www.suse.com/security/cve/CVE-2013-7114/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2281 page", "url": "https://www.suse.com/security/cve/CVE-2014-2281/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2282 page", "url": "https://www.suse.com/security/cve/CVE-2014-2282/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2283 page", "url": "https://www.suse.com/security/cve/CVE-2014-2283/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2299 page", "url": "https://www.suse.com/security/cve/CVE-2014-2299/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6421 page", "url": "https://www.suse.com/security/cve/CVE-2014-6421/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6422 page", "url": "https://www.suse.com/security/cve/CVE-2014-6422/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6423 page", "url": "https://www.suse.com/security/cve/CVE-2014-6423/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6424 page", "url": "https://www.suse.com/security/cve/CVE-2014-6424/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6427 page", "url": "https://www.suse.com/security/cve/CVE-2014-6427/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6428 page", "url": "https://www.suse.com/security/cve/CVE-2014-6428/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6429 page", "url": "https://www.suse.com/security/cve/CVE-2014-6429/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6430 page", "url": "https://www.suse.com/security/cve/CVE-2014-6430/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6431 page", "url": "https://www.suse.com/security/cve/CVE-2014-6431/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6432 page", "url": "https://www.suse.com/security/cve/CVE-2014-6432/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8710 page", "url": "https://www.suse.com/security/cve/CVE-2014-8710/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8711 page", "url": "https://www.suse.com/security/cve/CVE-2014-8711/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8712 page", "url": "https://www.suse.com/security/cve/CVE-2014-8712/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8713 page", "url": "https://www.suse.com/security/cve/CVE-2014-8713/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8714 page", "url": "https://www.suse.com/security/cve/CVE-2014-8714/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0559 page", "url": "https://www.suse.com/security/cve/CVE-2015-0559/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0560 page", "url": "https://www.suse.com/security/cve/CVE-2015-0560/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0561 page", "url": "https://www.suse.com/security/cve/CVE-2015-0561/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0562 page", "url": "https://www.suse.com/security/cve/CVE-2015-0562/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0563 page", "url": "https://www.suse.com/security/cve/CVE-2015-0563/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0564 page", "url": "https://www.suse.com/security/cve/CVE-2015-0564/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2188 page", "url": "https://www.suse.com/security/cve/CVE-2015-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2189 page", "url": "https://www.suse.com/security/cve/CVE-2015-2189/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2191 page", "url": "https://www.suse.com/security/cve/CVE-2015-2191/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3811 page", "url": "https://www.suse.com/security/cve/CVE-2015-3811/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3812 page", "url": "https://www.suse.com/security/cve/CVE-2015-3812/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3814 page", "url": "https://www.suse.com/security/cve/CVE-2015-3814/" } ], "title": "Security update for wireshark", "tracking": { "current_release_date": "2014-11-14T12:53:20Z", "generator": { "date": "2014-11-14T12:53:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0426-1", "initial_release_date": "2014-11-14T12:53:20Z", "revision_history": [ { "date": "2014-11-14T12:53:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.i586", "product": { "name": "wireshark-1.10.11-0.2.1.i586", "product_id": "wireshark-1.10.11-0.2.1.i586" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.i586", "product": { "name": "wireshark-devel-1.10.11-0.2.1.i586", "product_id": "wireshark-devel-1.10.11-0.2.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product_id": "wireshark-devel-1.10.11-0.2.1.ia64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-1.10.11-0.2.1.ia64", "product_id": "wireshark-1.10.11-0.2.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product_id": "wireshark-devel-1.10.11-0.2.1.ppc64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-1.10.11-0.2.1.ppc64", "product_id": "wireshark-1.10.11-0.2.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product_id": "wireshark-devel-1.10.11-0.2.1.s390x" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-1.10.11-0.2.1.s390x", "product_id": "wireshark-1.10.11-0.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-1.10.11-0.2.1.x86_64", "product_id": "wireshark-1.10.11-0.2.1.x86_64" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product_id": "wireshark-devel-1.10.11-0.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2486" } ], "notes": [ { "category": "general", "text": "The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2486", "url": "https://www.suse.com/security/cve/CVE-2013-2486" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2486", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-2486" }, { "cve": "CVE-2013-2487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2487" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2487", "url": "https://www.suse.com/security/cve/CVE-2013-2487" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2487", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-2487" }, { "cve": "CVE-2013-3555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3555" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3555", "url": "https://www.suse.com/security/cve/CVE-2013-3555" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3555" }, { "cve": "CVE-2013-3556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3556" } ], "notes": [ { "category": "general", "text": "The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3556", "url": "https://www.suse.com/security/cve/CVE-2013-3556" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3556" }, { "cve": "CVE-2013-3557", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3557" } ], "notes": [ { "category": "general", "text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3557", "url": "https://www.suse.com/security/cve/CVE-2013-3557" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3557" }, { "cve": "CVE-2013-3558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3558" } ], "notes": [ { "category": "general", "text": "The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3558", "url": "https://www.suse.com/security/cve/CVE-2013-3558" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3558" }, { "cve": "CVE-2013-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3559" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3559", "url": "https://www.suse.com/security/cve/CVE-2013-3559" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3559" }, { "cve": "CVE-2013-3560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3560" } ], "notes": [ { "category": "general", "text": "The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3560", "url": "https://www.suse.com/security/cve/CVE-2013-3560" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3560" }, { "cve": "CVE-2013-3561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3561" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3561", "url": "https://www.suse.com/security/cve/CVE-2013-3561" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3561" }, { "cve": "CVE-2013-3562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3562" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3562", "url": "https://www.suse.com/security/cve/CVE-2013-3562" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3562" }, { "cve": "CVE-2013-4074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4074" } ], "notes": [ { "category": "general", "text": "The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4074", "url": "https://www.suse.com/security/cve/CVE-2013-4074" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4074", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4074" }, { "cve": "CVE-2013-4075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4075" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4075", "url": "https://www.suse.com/security/cve/CVE-2013-4075" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4075", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4075", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4075" }, { "cve": "CVE-2013-4076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4076" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4076", "url": "https://www.suse.com/security/cve/CVE-2013-4076" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4076", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4076" }, { "cve": "CVE-2013-4077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4077" } ], "notes": [ { "category": "general", "text": "Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4077", "url": "https://www.suse.com/security/cve/CVE-2013-4077" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4077", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4077" }, { "cve": "CVE-2013-4078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4078" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4078", "url": "https://www.suse.com/security/cve/CVE-2013-4078" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4078", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4078" }, { "cve": "CVE-2013-4079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4079" } ], "notes": [ { "category": "general", "text": "The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4079", "url": "https://www.suse.com/security/cve/CVE-2013-4079" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4079", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4079", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4079" }, { "cve": "CVE-2013-4080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4080" } ], "notes": [ { "category": "general", "text": "The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4080", "url": "https://www.suse.com/security/cve/CVE-2013-4080" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4080", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4080" }, { "cve": "CVE-2013-4081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4081" } ], "notes": [ { "category": "general", "text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4081", "url": "https://www.suse.com/security/cve/CVE-2013-4081" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4081", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836116 for CVE-2013-4081", "url": "https://bugzilla.suse.com/836116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4081" }, { "cve": "CVE-2013-4082", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4082" } ], "notes": [ { "category": "general", "text": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4082", "url": "https://www.suse.com/security/cve/CVE-2013-4082" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4082", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4082" }, { "cve": "CVE-2013-4083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4083" } ], "notes": [ { "category": "general", "text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4083", "url": "https://www.suse.com/security/cve/CVE-2013-4083" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4083", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4083", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4083" }, { "cve": "CVE-2013-4929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4929" } ], "notes": [ { "category": "general", "text": "The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4929", "url": "https://www.suse.com/security/cve/CVE-2013-4929" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4929", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-4929" }, { "cve": "CVE-2013-4930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4930" } ], "notes": [ { "category": "general", "text": "The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4930", "url": "https://www.suse.com/security/cve/CVE-2013-4930" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4930", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4930" }, { "cve": "CVE-2013-4931", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4931" } ], "notes": [ { "category": "general", "text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4931", "url": "https://www.suse.com/security/cve/CVE-2013-4931" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4931", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4931" }, { "cve": "CVE-2013-4932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4932" } ], "notes": [ { "category": "general", "text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4932", "url": "https://www.suse.com/security/cve/CVE-2013-4932" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4932", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4932" }, { "cve": "CVE-2013-4933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4933" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4933", "url": "https://www.suse.com/security/cve/CVE-2013-4933" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4933", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4933" }, { "cve": "CVE-2013-4934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4934" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4934", "url": "https://www.suse.com/security/cve/CVE-2013-4934" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4934", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4934" }, { "cve": "CVE-2013-4935", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4935" } ], "notes": [ { "category": "general", "text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4935", "url": "https://www.suse.com/security/cve/CVE-2013-4935" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4935", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4935" }, { "cve": "CVE-2013-6336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6336" } ], "notes": [ { "category": "general", "text": "The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6336", "url": "https://www.suse.com/security/cve/CVE-2013-6336" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6336", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6336" }, { "cve": "CVE-2013-6337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6337" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6337", "url": "https://www.suse.com/security/cve/CVE-2013-6337" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6337", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6337" }, { "cve": "CVE-2013-6338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6338" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6338", "url": "https://www.suse.com/security/cve/CVE-2013-6338" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6338", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6338" }, { "cve": "CVE-2013-6339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6339" } ], "notes": [ { "category": "general", "text": "The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6339", "url": "https://www.suse.com/security/cve/CVE-2013-6339" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6339", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6339" }, { "cve": "CVE-2013-6340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6340" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6340", "url": "https://www.suse.com/security/cve/CVE-2013-6340" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6340", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6340" }, { "cve": "CVE-2013-7112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7112" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7112", "url": "https://www.suse.com/security/cve/CVE-2013-7112" }, { "category": "external", "summary": "SUSE Bug 856498 for CVE-2013-7112", "url": "https://bugzilla.suse.com/856498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7112" }, { "cve": "CVE-2013-7113", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7113" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7113", "url": "https://www.suse.com/security/cve/CVE-2013-7113" }, { "category": "external", "summary": "SUSE Bug 856495 for CVE-2013-7113", "url": "https://bugzilla.suse.com/856495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-7113" }, { "cve": "CVE-2013-7114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7114" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7114", "url": "https://www.suse.com/security/cve/CVE-2013-7114" }, { "category": "external", "summary": "SUSE Bug 856496 for CVE-2013-7114", "url": "https://bugzilla.suse.com/856496" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7114" }, { "cve": "CVE-2014-2281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2281" } ], "notes": [ { "category": "general", "text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2281", "url": "https://www.suse.com/security/cve/CVE-2014-2281" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2281", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2281" }, { "cve": "CVE-2014-2282", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2282" } ], "notes": [ { "category": "general", "text": "The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2282", "url": "https://www.suse.com/security/cve/CVE-2014-2282" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2282", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2282" }, { "cve": "CVE-2014-2283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2283" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2283", "url": "https://www.suse.com/security/cve/CVE-2014-2283" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2283", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2283" }, { "cve": "CVE-2014-2299", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2299" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2299", "url": "https://www.suse.com/security/cve/CVE-2014-2299" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2299", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "critical" } ], "title": "CVE-2014-2299" }, { "cve": "CVE-2014-6421", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6421" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6421", "url": "https://www.suse.com/security/cve/CVE-2014-6421" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6421", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6421" }, { "cve": "CVE-2014-6422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6422" } ], "notes": [ { "category": "general", "text": "The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6422", "url": "https://www.suse.com/security/cve/CVE-2014-6422" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6422", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6422" }, { "cve": "CVE-2014-6423", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6423" } ], "notes": [ { "category": "general", "text": "The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6423", "url": "https://www.suse.com/security/cve/CVE-2014-6423" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6423", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6423" }, { "cve": "CVE-2014-6424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6424" } ], "notes": [ { "category": "general", "text": "The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6424", "url": "https://www.suse.com/security/cve/CVE-2014-6424" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6424", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6424" }, { "cve": "CVE-2014-6427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6427" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6427", "url": "https://www.suse.com/security/cve/CVE-2014-6427" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6427", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6427" }, { "cve": "CVE-2014-6428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6428" } ], "notes": [ { "category": "general", "text": "The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6428", "url": "https://www.suse.com/security/cve/CVE-2014-6428" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6428", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6428" }, { "cve": "CVE-2014-6429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6429" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6429", "url": "https://www.suse.com/security/cve/CVE-2014-6429" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6429", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6429" }, { "cve": "CVE-2014-6430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6430" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6430", "url": "https://www.suse.com/security/cve/CVE-2014-6430" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6430", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6430" }, { "cve": "CVE-2014-6431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6431" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6431", "url": "https://www.suse.com/security/cve/CVE-2014-6431" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6431", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6431" }, { "cve": "CVE-2014-6432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6432" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6432", "url": "https://www.suse.com/security/cve/CVE-2014-6432" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6432", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6432" }, { "cve": "CVE-2014-8710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8710" } ], "notes": [ { "category": "general", "text": "The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8710", "url": "https://www.suse.com/security/cve/CVE-2014-8710" }, { "category": "external", "summary": "SUSE Bug 905246 for CVE-2014-8710", "url": "https://bugzilla.suse.com/905246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8710" }, { "cve": "CVE-2014-8711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8711" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8711", "url": "https://www.suse.com/security/cve/CVE-2014-8711" }, { "category": "external", "summary": "SUSE Bug 905245 for CVE-2014-8711", "url": "https://bugzilla.suse.com/905245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8711" }, { "cve": "CVE-2014-8712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8712" } ], "notes": [ { "category": "general", "text": "The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8712", "url": "https://www.suse.com/security/cve/CVE-2014-8712" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8712", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8712" }, { "cve": "CVE-2014-8713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8713" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8713", "url": "https://www.suse.com/security/cve/CVE-2014-8713" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8713", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8713" }, { "cve": "CVE-2014-8714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8714" } ], "notes": [ { "category": "general", "text": "The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8714", "url": "https://www.suse.com/security/cve/CVE-2014-8714" }, { "category": "external", "summary": "SUSE Bug 905247 for CVE-2014-8714", "url": "https://bugzilla.suse.com/905247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8714" }, { "cve": "CVE-2015-0559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0559" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0559", "url": "https://www.suse.com/security/cve/CVE-2015-0559" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0559", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0559" }, { "cve": "CVE-2015-0560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0560" } ], "notes": [ { "category": "general", "text": "The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0560", "url": "https://www.suse.com/security/cve/CVE-2015-0560" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0560", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0560" }, { "cve": "CVE-2015-0561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0561" } ], "notes": [ { "category": "general", "text": "asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0561", "url": "https://www.suse.com/security/cve/CVE-2015-0561" }, { "category": "external", "summary": "SUSE Bug 912368 for CVE-2015-0561", "url": "https://bugzilla.suse.com/912368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0561" }, { "cve": "CVE-2015-0562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0562" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0562", "url": "https://www.suse.com/security/cve/CVE-2015-0562" }, { "category": "external", "summary": "SUSE Bug 912369 for CVE-2015-0562", "url": "https://bugzilla.suse.com/912369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0562" }, { "cve": "CVE-2015-0563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0563" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0563", "url": "https://www.suse.com/security/cve/CVE-2015-0563" }, { "category": "external", "summary": "SUSE Bug 912370 for CVE-2015-0563", "url": "https://bugzilla.suse.com/912370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0563" }, { "cve": "CVE-2015-0564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0564" } ], "notes": [ { "category": "general", "text": "Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0564", "url": "https://www.suse.com/security/cve/CVE-2015-0564" }, { "category": "external", "summary": "SUSE Bug 912372 for CVE-2015-0564", "url": "https://bugzilla.suse.com/912372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0564" }, { "cve": "CVE-2015-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2188" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2188", "url": "https://www.suse.com/security/cve/CVE-2015-2188" }, { "category": "external", "summary": "SUSE Bug 920696 for CVE-2015-2188", "url": "https://bugzilla.suse.com/920696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2188" }, { "cve": "CVE-2015-2189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2189" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2189", "url": "https://www.suse.com/security/cve/CVE-2015-2189" }, { "category": "external", "summary": "SUSE Bug 920697 for CVE-2015-2189", "url": "https://bugzilla.suse.com/920697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2189" }, { "cve": "CVE-2015-2191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2191" } ], "notes": [ { "category": "general", "text": "Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2191", "url": "https://www.suse.com/security/cve/CVE-2015-2191" }, { "category": "external", "summary": "SUSE Bug 920699 for CVE-2015-2191", "url": "https://bugzilla.suse.com/920699" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2191" }, { "cve": "CVE-2015-3811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3811" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3811", "url": "https://www.suse.com/security/cve/CVE-2015-3811" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3811" }, { "cve": "CVE-2015-3812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3812" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3812", "url": "https://www.suse.com/security/cve/CVE-2015-3812" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3812" }, { "cve": "CVE-2015-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3814" } ], "notes": [ { "category": "general", "text": "The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3814", "url": "https://www.suse.com/security/cve/CVE-2015-3814" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3814" } ] }
suse-su-2015:0653-1
Vulnerability from csaf_suse
Published
2014-11-14 12:53
Modified
2014-11-14 12:53
Summary
Security update for wireshark
Notes
Title of the patch
Security update for wireshark
Description of the patch
wireshark has been updated to version 1.10.11 to fix five security issues.
These security issues have been fixed:
* SigComp UDVM buffer overflow (CVE-2014-8710).
* AMQP dissector crash (CVE-2014-8711).
* NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
* TN5250 infinite loops (CVE-2014-8714).
This non-security issue has been fixed:
* enable zlib (bnc#899303).
Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
<https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html>
Security Issues:
* CVE-2014-8711
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711>
* CVE-2014-8710
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710>
* CVE-2014-8714
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714>
* CVE-2014-8712
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712>
* CVE-2014-8713
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713>
Patchnames
sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wireshark", "title": "Title of the patch" }, { "category": "description", "text": "\nwireshark has been updated to version 1.10.11 to fix five security issues.\n\nThese security issues have been fixed:\n\n * SigComp UDVM buffer overflow (CVE-2014-8710).\n * AMQP dissector crash (CVE-2014-8711).\n * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).\n * TN5250 infinite loops (CVE-2014-8714).\n\nThis non-security issue has been fixed:\n\n * enable zlib (bnc#899303).\n\nFurther bug fixes and updated protocol support as listed in:\n\nhttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\n\u003chttps://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html\u003e\n\nSecurity Issues:\n\n * CVE-2014-8711\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711\u003e\n * CVE-2014-8710\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710\u003e\n * CVE-2014-8714\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714\u003e\n * CVE-2014-8712\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712\u003e\n * CVE-2014-8713\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-wireshark,sledsp3-wireshark,slessp3-wireshark", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0653-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0653-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150653-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0653-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" }, { "category": "self", "summary": "SUSE Bug 813217", "url": "https://bugzilla.suse.com/813217" }, { "category": "self", "summary": "SUSE Bug 816517", "url": "https://bugzilla.suse.com/816517" }, { "category": "self", "summary": "SUSE Bug 816887", "url": "https://bugzilla.suse.com/816887" }, { "category": "self", "summary": "SUSE Bug 820973", "url": "https://bugzilla.suse.com/820973" }, { "category": "self", "summary": "SUSE Bug 824900", "url": "https://bugzilla.suse.com/824900" }, { "category": "self", "summary": "SUSE Bug 831718", "url": "https://bugzilla.suse.com/831718" }, { "category": "self", "summary": "SUSE Bug 839607", "url": "https://bugzilla.suse.com/839607" }, { "category": "self", "summary": "SUSE Bug 848738", "url": "https://bugzilla.suse.com/848738" }, { "category": "self", "summary": "SUSE Bug 855980", "url": "https://bugzilla.suse.com/855980" }, { "category": "self", "summary": "SUSE Bug 856495", "url": "https://bugzilla.suse.com/856495" }, { "category": "self", "summary": "SUSE Bug 856496", "url": "https://bugzilla.suse.com/856496" }, { "category": "self", "summary": "SUSE Bug 856498", "url": "https://bugzilla.suse.com/856498" }, { "category": "self", "summary": "SUSE Bug 867485", "url": "https://bugzilla.suse.com/867485" }, { "category": "self", "summary": "SUSE Bug 889854", "url": "https://bugzilla.suse.com/889854" }, { "category": "self", "summary": "SUSE Bug 889899", "url": "https://bugzilla.suse.com/889899" }, { "category": "self", "summary": "SUSE Bug 889900", "url": "https://bugzilla.suse.com/889900" }, { "category": "self", "summary": "SUSE Bug 889901", "url": "https://bugzilla.suse.com/889901" }, { "category": "self", "summary": "SUSE Bug 889906", "url": "https://bugzilla.suse.com/889906" }, { "category": "self", "summary": "SUSE Bug 897055", "url": "https://bugzilla.suse.com/897055" }, { "category": "self", "summary": "SUSE Bug 899303", "url": "https://bugzilla.suse.com/899303" }, { "category": "self", "summary": "SUSE Bug 905245", "url": "https://bugzilla.suse.com/905245" }, { "category": "self", "summary": "SUSE Bug 905246", "url": "https://bugzilla.suse.com/905246" }, { "category": "self", "summary": "SUSE Bug 905247", "url": "https://bugzilla.suse.com/905247" }, { "category": "self", "summary": "SUSE Bug 905248", "url": "https://bugzilla.suse.com/905248" }, { "category": "self", "summary": "SUSE Bug 912365", "url": "https://bugzilla.suse.com/912365" }, { "category": "self", "summary": "SUSE Bug 912368", "url": "https://bugzilla.suse.com/912368" }, { "category": "self", "summary": "SUSE Bug 912369", "url": "https://bugzilla.suse.com/912369" }, { "category": "self", "summary": "SUSE Bug 912370", "url": "https://bugzilla.suse.com/912370" }, { "category": "self", "summary": "SUSE Bug 912372", "url": "https://bugzilla.suse.com/912372" }, { "category": "self", "summary": "SUSE Bug 920696", "url": "https://bugzilla.suse.com/920696" }, { "category": "self", "summary": "SUSE Bug 920697", "url": "https://bugzilla.suse.com/920697" }, { "category": "self", "summary": "SUSE Bug 920699", "url": "https://bugzilla.suse.com/920699" }, { "category": "self", "summary": "SUSE Bug 930691", "url": "https://bugzilla.suse.com/930691" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2486 page", "url": "https://www.suse.com/security/cve/CVE-2013-2486/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2487 page", "url": "https://www.suse.com/security/cve/CVE-2013-2487/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3555 page", "url": "https://www.suse.com/security/cve/CVE-2013-3555/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3556 page", "url": "https://www.suse.com/security/cve/CVE-2013-3556/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3557 page", "url": "https://www.suse.com/security/cve/CVE-2013-3557/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3558 page", "url": "https://www.suse.com/security/cve/CVE-2013-3558/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3559 page", "url": "https://www.suse.com/security/cve/CVE-2013-3559/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3560 page", "url": "https://www.suse.com/security/cve/CVE-2013-3560/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3561 page", "url": "https://www.suse.com/security/cve/CVE-2013-3561/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-3562 page", "url": "https://www.suse.com/security/cve/CVE-2013-3562/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4074 page", "url": "https://www.suse.com/security/cve/CVE-2013-4074/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4075 page", "url": "https://www.suse.com/security/cve/CVE-2013-4075/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4076 page", "url": "https://www.suse.com/security/cve/CVE-2013-4076/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4077 page", "url": "https://www.suse.com/security/cve/CVE-2013-4077/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4078 page", "url": "https://www.suse.com/security/cve/CVE-2013-4078/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4079 page", "url": "https://www.suse.com/security/cve/CVE-2013-4079/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4080 page", "url": "https://www.suse.com/security/cve/CVE-2013-4080/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4081 page", "url": "https://www.suse.com/security/cve/CVE-2013-4081/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4082 page", "url": "https://www.suse.com/security/cve/CVE-2013-4082/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4083 page", "url": "https://www.suse.com/security/cve/CVE-2013-4083/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4929 page", "url": "https://www.suse.com/security/cve/CVE-2013-4929/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4930 page", "url": "https://www.suse.com/security/cve/CVE-2013-4930/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4931 page", "url": "https://www.suse.com/security/cve/CVE-2013-4931/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4932 page", "url": "https://www.suse.com/security/cve/CVE-2013-4932/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4933 page", "url": "https://www.suse.com/security/cve/CVE-2013-4933/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4934 page", "url": "https://www.suse.com/security/cve/CVE-2013-4934/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4935 page", "url": "https://www.suse.com/security/cve/CVE-2013-4935/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6336 page", "url": "https://www.suse.com/security/cve/CVE-2013-6336/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6337 page", "url": "https://www.suse.com/security/cve/CVE-2013-6337/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6338 page", "url": "https://www.suse.com/security/cve/CVE-2013-6338/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6339 page", "url": "https://www.suse.com/security/cve/CVE-2013-6339/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6340 page", "url": "https://www.suse.com/security/cve/CVE-2013-6340/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7112 page", "url": "https://www.suse.com/security/cve/CVE-2013-7112/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7113 page", "url": "https://www.suse.com/security/cve/CVE-2013-7113/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-7114 page", "url": "https://www.suse.com/security/cve/CVE-2013-7114/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2281 page", "url": "https://www.suse.com/security/cve/CVE-2014-2281/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2282 page", "url": "https://www.suse.com/security/cve/CVE-2014-2282/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2283 page", "url": "https://www.suse.com/security/cve/CVE-2014-2283/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2299 page", "url": "https://www.suse.com/security/cve/CVE-2014-2299/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6421 page", "url": "https://www.suse.com/security/cve/CVE-2014-6421/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6422 page", "url": "https://www.suse.com/security/cve/CVE-2014-6422/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6423 page", "url": "https://www.suse.com/security/cve/CVE-2014-6423/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6424 page", "url": "https://www.suse.com/security/cve/CVE-2014-6424/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6427 page", "url": "https://www.suse.com/security/cve/CVE-2014-6427/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6428 page", "url": "https://www.suse.com/security/cve/CVE-2014-6428/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6429 page", "url": "https://www.suse.com/security/cve/CVE-2014-6429/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6430 page", "url": "https://www.suse.com/security/cve/CVE-2014-6430/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6431 page", "url": "https://www.suse.com/security/cve/CVE-2014-6431/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6432 page", "url": "https://www.suse.com/security/cve/CVE-2014-6432/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8710 page", "url": "https://www.suse.com/security/cve/CVE-2014-8710/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8711 page", "url": "https://www.suse.com/security/cve/CVE-2014-8711/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8712 page", "url": "https://www.suse.com/security/cve/CVE-2014-8712/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8713 page", "url": "https://www.suse.com/security/cve/CVE-2014-8713/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8714 page", "url": "https://www.suse.com/security/cve/CVE-2014-8714/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0559 page", "url": "https://www.suse.com/security/cve/CVE-2015-0559/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0560 page", "url": "https://www.suse.com/security/cve/CVE-2015-0560/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0561 page", "url": "https://www.suse.com/security/cve/CVE-2015-0561/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0562 page", "url": "https://www.suse.com/security/cve/CVE-2015-0562/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0563 page", "url": "https://www.suse.com/security/cve/CVE-2015-0563/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0564 page", "url": "https://www.suse.com/security/cve/CVE-2015-0564/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2188 page", "url": "https://www.suse.com/security/cve/CVE-2015-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2189 page", "url": "https://www.suse.com/security/cve/CVE-2015-2189/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2191 page", "url": "https://www.suse.com/security/cve/CVE-2015-2191/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3811 page", "url": "https://www.suse.com/security/cve/CVE-2015-3811/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3812 page", "url": "https://www.suse.com/security/cve/CVE-2015-3812/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3814 page", "url": "https://www.suse.com/security/cve/CVE-2015-3814/" } ], "title": "Security update for wireshark", "tracking": { "current_release_date": "2014-11-14T12:53:20Z", "generator": { "date": "2014-11-14T12:53:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0653-1", "initial_release_date": "2014-11-14T12:53:20Z", "revision_history": [ { "date": "2014-11-14T12:53:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.i586", "product": { "name": "wireshark-1.10.11-0.2.1.i586", "product_id": "wireshark-1.10.11-0.2.1.i586" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.i586", "product": { "name": "wireshark-devel-1.10.11-0.2.1.i586", "product_id": "wireshark-devel-1.10.11-0.2.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ia64", "product_id": "wireshark-devel-1.10.11-0.2.1.ia64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ia64", "product": { "name": "wireshark-1.10.11-0.2.1.ia64", "product_id": "wireshark-1.10.11-0.2.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64", "product_id": "wireshark-devel-1.10.11-0.2.1.ppc64" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.ppc64", "product": { "name": "wireshark-1.10.11-0.2.1.ppc64", "product_id": "wireshark-1.10.11-0.2.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-devel-1.10.11-0.2.1.s390x", "product_id": "wireshark-devel-1.10.11-0.2.1.s390x" } }, { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.s390x", "product": { "name": "wireshark-1.10.11-0.2.1.s390x", "product_id": "wireshark-1.10.11-0.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wireshark-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-1.10.11-0.2.1.x86_64", "product_id": "wireshark-1.10.11-0.2.1.x86_64" } }, { "category": "product_version", "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64", "product_id": "wireshark-devel-1.10.11-0.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-devel-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586" }, "product_reference": "wireshark-1.10.11-0.2.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64" }, "product_reference": "wireshark-1.10.11-0.2.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64" }, "product_reference": "wireshark-1.10.11-0.2.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x" }, "product_reference": "wireshark-1.10.11-0.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-1.10.11-0.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64" }, "product_reference": "wireshark-1.10.11-0.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2486" } ], "notes": [ { "category": "general", "text": "The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2486", "url": "https://www.suse.com/security/cve/CVE-2013-2486" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2486", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2486", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-2486" }, { "cve": "CVE-2013-2487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2487" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2487", "url": "https://www.suse.com/security/cve/CVE-2013-2487" }, { "category": "external", "summary": "SUSE Bug 807942 for CVE-2013-2487", "url": "https://bugzilla.suse.com/807942" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-2487", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-2487" }, { "cve": "CVE-2013-3555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3555" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3555", "url": "https://www.suse.com/security/cve/CVE-2013-3555" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3555", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3555" }, { "cve": "CVE-2013-3556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3556" } ], "notes": [ { "category": "general", "text": "The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3556", "url": "https://www.suse.com/security/cve/CVE-2013-3556" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3556", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3556" }, { "cve": "CVE-2013-3557", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3557" } ], "notes": [ { "category": "general", "text": "The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3557", "url": "https://www.suse.com/security/cve/CVE-2013-3557" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3557", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3557" }, { "cve": "CVE-2013-3558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3558" } ], "notes": [ { "category": "general", "text": "The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3558", "url": "https://www.suse.com/security/cve/CVE-2013-3558" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3558", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3558" }, { "cve": "CVE-2013-3559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3559" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3559", "url": "https://www.suse.com/security/cve/CVE-2013-3559" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3559", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3559" }, { "cve": "CVE-2013-3560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3560" } ], "notes": [ { "category": "general", "text": "The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3560", "url": "https://www.suse.com/security/cve/CVE-2013-3560" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3560", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3560" }, { "cve": "CVE-2013-3561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3561" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3561", "url": "https://www.suse.com/security/cve/CVE-2013-3561" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3561", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3561" }, { "cve": "CVE-2013-3562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-3562" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-3562", "url": "https://www.suse.com/security/cve/CVE-2013-3562" }, { "category": "external", "summary": "SUSE Bug 820566 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820566" }, { "category": "external", "summary": "SUSE Bug 820973 for CVE-2013-3562", "url": "https://bugzilla.suse.com/820973" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-3562" }, { "cve": "CVE-2013-4074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4074" } ], "notes": [ { "category": "general", "text": "The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4074", "url": "https://www.suse.com/security/cve/CVE-2013-4074" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4074", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4074" }, { "cve": "CVE-2013-4075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4075" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4075", "url": "https://www.suse.com/security/cve/CVE-2013-4075" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4075", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4075", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4075" }, { "cve": "CVE-2013-4076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4076" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4076", "url": "https://www.suse.com/security/cve/CVE-2013-4076" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4076", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4076" }, { "cve": "CVE-2013-4077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4077" } ], "notes": [ { "category": "general", "text": "Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4077", "url": "https://www.suse.com/security/cve/CVE-2013-4077" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4077", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4077" }, { "cve": "CVE-2013-4078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4078" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4078", "url": "https://www.suse.com/security/cve/CVE-2013-4078" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4078", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4078" }, { "cve": "CVE-2013-4079", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4079" } ], "notes": [ { "category": "general", "text": "The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4079", "url": "https://www.suse.com/security/cve/CVE-2013-4079" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4079", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836146 for CVE-2013-4079", "url": "https://bugzilla.suse.com/836146" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4079" }, { "cve": "CVE-2013-4080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4080" } ], "notes": [ { "category": "general", "text": "The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4080", "url": "https://www.suse.com/security/cve/CVE-2013-4080" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4080", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4080" }, { "cve": "CVE-2013-4081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4081" } ], "notes": [ { "category": "general", "text": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4081", "url": "https://www.suse.com/security/cve/CVE-2013-4081" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4081", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 836116 for CVE-2013-4081", "url": "https://bugzilla.suse.com/836116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4081" }, { "cve": "CVE-2013-4082", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4082" } ], "notes": [ { "category": "general", "text": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4082", "url": "https://www.suse.com/security/cve/CVE-2013-4082" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4082", "url": "https://bugzilla.suse.com/824900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4082" }, { "cve": "CVE-2013-4083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4083" } ], "notes": [ { "category": "general", "text": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4083", "url": "https://www.suse.com/security/cve/CVE-2013-4083" }, { "category": "external", "summary": "SUSE Bug 824900 for CVE-2013-4083", "url": "https://bugzilla.suse.com/824900" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4083", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4083" }, { "cve": "CVE-2013-4929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4929" } ], "notes": [ { "category": "general", "text": "The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4929", "url": "https://www.suse.com/security/cve/CVE-2013-4929" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4929", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-4929" }, { "cve": "CVE-2013-4930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4930" } ], "notes": [ { "category": "general", "text": "The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4930", "url": "https://www.suse.com/security/cve/CVE-2013-4930" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4930", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4930" }, { "cve": "CVE-2013-4931", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4931" } ], "notes": [ { "category": "general", "text": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4931", "url": "https://www.suse.com/security/cve/CVE-2013-4931" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4931", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4931" }, { "cve": "CVE-2013-4932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4932" } ], "notes": [ { "category": "general", "text": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4932", "url": "https://www.suse.com/security/cve/CVE-2013-4932" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4932", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4932" }, { "cve": "CVE-2013-4933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4933" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4933", "url": "https://www.suse.com/security/cve/CVE-2013-4933" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4933", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4933" }, { "cve": "CVE-2013-4934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4934" } ], "notes": [ { "category": "general", "text": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4934", "url": "https://www.suse.com/security/cve/CVE-2013-4934" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4934", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4934" }, { "cve": "CVE-2013-4935", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4935" } ], "notes": [ { "category": "general", "text": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4935", "url": "https://www.suse.com/security/cve/CVE-2013-4935" }, { "category": "external", "summary": "SUSE Bug 831718 for CVE-2013-4935", "url": "https://bugzilla.suse.com/831718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-4935" }, { "cve": "CVE-2013-6336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6336" } ], "notes": [ { "category": "general", "text": "The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6336", "url": "https://www.suse.com/security/cve/CVE-2013-6336" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6336", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6336" }, { "cve": "CVE-2013-6337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6337" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6337", "url": "https://www.suse.com/security/cve/CVE-2013-6337" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6337", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6337" }, { "cve": "CVE-2013-6338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6338" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6338", "url": "https://www.suse.com/security/cve/CVE-2013-6338" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6338", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6338" }, { "cve": "CVE-2013-6339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6339" } ], "notes": [ { "category": "general", "text": "The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6339", "url": "https://www.suse.com/security/cve/CVE-2013-6339" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6339", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6339" }, { "cve": "CVE-2013-6340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6340" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6340", "url": "https://www.suse.com/security/cve/CVE-2013-6340" }, { "category": "external", "summary": "SUSE Bug 848738 for CVE-2013-6340", "url": "https://bugzilla.suse.com/848738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-6340" }, { "cve": "CVE-2013-7112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7112" } ], "notes": [ { "category": "general", "text": "The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7112", "url": "https://www.suse.com/security/cve/CVE-2013-7112" }, { "category": "external", "summary": "SUSE Bug 856498 for CVE-2013-7112", "url": "https://bugzilla.suse.com/856498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7112" }, { "cve": "CVE-2013-7113", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7113" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7113", "url": "https://www.suse.com/security/cve/CVE-2013-7113" }, { "category": "external", "summary": "SUSE Bug 856495 for CVE-2013-7113", "url": "https://bugzilla.suse.com/856495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2013-7113" }, { "cve": "CVE-2013-7114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-7114" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-7114", "url": "https://www.suse.com/security/cve/CVE-2013-7114" }, { "category": "external", "summary": "SUSE Bug 856496 for CVE-2013-7114", "url": "https://bugzilla.suse.com/856496" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "important" } ], "title": "CVE-2013-7114" }, { "cve": "CVE-2014-2281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2281" } ], "notes": [ { "category": "general", "text": "The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2281", "url": "https://www.suse.com/security/cve/CVE-2014-2281" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2281", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2281" }, { "cve": "CVE-2014-2282", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2282" } ], "notes": [ { "category": "general", "text": "The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2282", "url": "https://www.suse.com/security/cve/CVE-2014-2282" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2282", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2282" }, { "cve": "CVE-2014-2283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2283" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2283", "url": "https://www.suse.com/security/cve/CVE-2014-2283" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2283", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-2283" }, { "cve": "CVE-2014-2299", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2299" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2299", "url": "https://www.suse.com/security/cve/CVE-2014-2299" }, { "category": "external", "summary": "SUSE Bug 867485 for CVE-2014-2299", "url": "https://bugzilla.suse.com/867485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "critical" } ], "title": "CVE-2014-2299" }, { "cve": "CVE-2014-6421", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6421" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6421", "url": "https://www.suse.com/security/cve/CVE-2014-6421" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6421", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6421" }, { "cve": "CVE-2014-6422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6422" } ], "notes": [ { "category": "general", "text": "The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6422", "url": "https://www.suse.com/security/cve/CVE-2014-6422" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6422", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6422" }, { "cve": "CVE-2014-6423", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6423" } ], "notes": [ { "category": "general", "text": "The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6423", "url": "https://www.suse.com/security/cve/CVE-2014-6423" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6423", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6423" }, { "cve": "CVE-2014-6424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6424" } ], "notes": [ { "category": "general", "text": "The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6424", "url": "https://www.suse.com/security/cve/CVE-2014-6424" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6424", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6424" }, { "cve": "CVE-2014-6427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6427" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6427", "url": "https://www.suse.com/security/cve/CVE-2014-6427" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6427", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6427" }, { "cve": "CVE-2014-6428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6428" } ], "notes": [ { "category": "general", "text": "The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6428", "url": "https://www.suse.com/security/cve/CVE-2014-6428" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6428", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6428" }, { "cve": "CVE-2014-6429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6429" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6429", "url": "https://www.suse.com/security/cve/CVE-2014-6429" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6429", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6429" }, { "cve": "CVE-2014-6430", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6430" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6430", "url": "https://www.suse.com/security/cve/CVE-2014-6430" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6430", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6430" }, { "cve": "CVE-2014-6431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6431" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6431", "url": "https://www.suse.com/security/cve/CVE-2014-6431" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6431", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6431" }, { "cve": "CVE-2014-6432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6432" } ], "notes": [ { "category": "general", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6432", "url": "https://www.suse.com/security/cve/CVE-2014-6432" }, { "category": "external", "summary": "SUSE Bug 897055 for CVE-2014-6432", "url": "https://bugzilla.suse.com/897055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-6432" }, { "cve": "CVE-2014-8710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8710" } ], "notes": [ { "category": "general", "text": "The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8710", "url": "https://www.suse.com/security/cve/CVE-2014-8710" }, { "category": "external", "summary": "SUSE Bug 905246 for CVE-2014-8710", "url": "https://bugzilla.suse.com/905246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8710" }, { "cve": "CVE-2014-8711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8711" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8711", "url": "https://www.suse.com/security/cve/CVE-2014-8711" }, { "category": "external", "summary": "SUSE Bug 905245 for CVE-2014-8711", "url": "https://bugzilla.suse.com/905245" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8711" }, { "cve": "CVE-2014-8712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8712" } ], "notes": [ { "category": "general", "text": "The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8712", "url": "https://www.suse.com/security/cve/CVE-2014-8712" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8712", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8712" }, { "cve": "CVE-2014-8713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8713" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8713", "url": "https://www.suse.com/security/cve/CVE-2014-8713" }, { "category": "external", "summary": "SUSE Bug 905248 for CVE-2014-8713", "url": "https://bugzilla.suse.com/905248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8713" }, { "cve": "CVE-2014-8714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8714" } ], "notes": [ { "category": "general", "text": "The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8714", "url": "https://www.suse.com/security/cve/CVE-2014-8714" }, { "category": "external", "summary": "SUSE Bug 905247 for CVE-2014-8714", "url": "https://bugzilla.suse.com/905247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2014-8714" }, { "cve": "CVE-2015-0559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0559" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0559", "url": "https://www.suse.com/security/cve/CVE-2015-0559" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0559", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0559" }, { "cve": "CVE-2015-0560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0560" } ], "notes": [ { "category": "general", "text": "The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0560", "url": "https://www.suse.com/security/cve/CVE-2015-0560" }, { "category": "external", "summary": "SUSE Bug 912365 for CVE-2015-0560", "url": "https://bugzilla.suse.com/912365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0560" }, { "cve": "CVE-2015-0561", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0561" } ], "notes": [ { "category": "general", "text": "asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0561", "url": "https://www.suse.com/security/cve/CVE-2015-0561" }, { "category": "external", "summary": "SUSE Bug 912368 for CVE-2015-0561", "url": "https://bugzilla.suse.com/912368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0561" }, { "cve": "CVE-2015-0562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0562" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0562", "url": "https://www.suse.com/security/cve/CVE-2015-0562" }, { "category": "external", "summary": "SUSE Bug 912369 for CVE-2015-0562", "url": "https://bugzilla.suse.com/912369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0562" }, { "cve": "CVE-2015-0563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0563" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0563", "url": "https://www.suse.com/security/cve/CVE-2015-0563" }, { "category": "external", "summary": "SUSE Bug 912370 for CVE-2015-0563", "url": "https://bugzilla.suse.com/912370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0563" }, { "cve": "CVE-2015-0564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0564" } ], "notes": [ { "category": "general", "text": "Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0564", "url": "https://www.suse.com/security/cve/CVE-2015-0564" }, { "category": "external", "summary": "SUSE Bug 912372 for CVE-2015-0564", "url": "https://bugzilla.suse.com/912372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-0564" }, { "cve": "CVE-2015-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2188" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2188", "url": "https://www.suse.com/security/cve/CVE-2015-2188" }, { "category": "external", "summary": "SUSE Bug 920696 for CVE-2015-2188", "url": "https://bugzilla.suse.com/920696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2188" }, { "cve": "CVE-2015-2189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2189" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2189", "url": "https://www.suse.com/security/cve/CVE-2015-2189" }, { "category": "external", "summary": "SUSE Bug 920697 for CVE-2015-2189", "url": "https://bugzilla.suse.com/920697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2189" }, { "cve": "CVE-2015-2191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2191" } ], "notes": [ { "category": "general", "text": "Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2191", "url": "https://www.suse.com/security/cve/CVE-2015-2191" }, { "category": "external", "summary": "SUSE Bug 920699 for CVE-2015-2191", "url": "https://bugzilla.suse.com/920699" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-2191" }, { "cve": "CVE-2015-3811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3811" } ], "notes": [ { "category": "general", "text": "epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3811", "url": "https://www.suse.com/security/cve/CVE-2015-3811" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3811", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3811" }, { "cve": "CVE-2015-3812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3812" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3812", "url": "https://www.suse.com/security/cve/CVE-2015-3812" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3812", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3812" }, { "cve": "CVE-2015-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3814" } ], "notes": [ { "category": "general", "text": "The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3814", "url": "https://www.suse.com/security/cve/CVE-2015-3814" }, { "category": "external", "summary": "SUSE Bug 930689 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930689" }, { "category": "external", "summary": "SUSE Bug 930691 for CVE-2015-3814", "url": "https://bugzilla.suse.com/930691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-1.10.11-0.2.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:wireshark-devel-1.10.11-0.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-11-14T12:53:20Z", "details": "moderate" } ], "title": "CVE-2015-3814" } ] }
rhsa-2014:1677
Vulnerability from csaf_redhat
Published
2014-10-21 19:41
Modified
2024-11-22 08:33
Summary
Red Hat Security Advisory: wireshark security update
Notes
Topic
Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Wireshark is a network protocol analyzer. It is used to capture and browse
the traffic running on a computer network.
Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash or,
possibly, execute arbitrary code as the user running Wireshark.
(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)
Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423,
CVE-2014-6425, CVE-2014-6428)
All wireshark users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. All running instances
of Wireshark must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated wireshark packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Wireshark is a network protocol analyzer. It is used to capture and browse\nthe traffic running on a computer network.\n\nMultiple flaws were found in Wireshark. If Wireshark read a malformed\npacket off a network or opened a malicious dump file, it could crash or,\npossibly, execute arbitrary code as the user running Wireshark.\n(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)\n\nSeveral denial of service flaws were found in Wireshark. Wireshark could\ncrash or stop responding if it read a malformed packet off a network, or\nopened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423,\nCVE-2014-6425, CVE-2014-6428)\n\nAll wireshark users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. All running instances\nof Wireshark must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1677", "url": "https://access.redhat.com/errata/RHSA-2014:1677" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1142602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142602" }, { "category": "external", "summary": "1142603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142603" }, { "category": "external", "summary": "1142608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142608" }, { "category": "external", "summary": "1142610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142610" }, { "category": "external", "summary": "1142611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142611" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1677.json" } ], "title": "Red Hat Security Advisory: wireshark security update", "tracking": { "current_release_date": "2024-11-22T08:33:51+00:00", "generator": { "date": "2024-11-22T08:33:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1677", "initial_release_date": "2014-10-21T19:41:40+00:00", "revision_history": [ { "date": "2014-10-21T19:41:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-21T19:41:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:33:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "product": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "product_id": "wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-7.el5_11?arch=i386" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.0.15-7.el5_11.i386", "product": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.i386", "product_id": "wireshark-gnome-0:1.0.15-7.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-7.el5_11?arch=i386" } } }, { "category": "product_version", "name": "wireshark-0:1.0.15-7.el5_11.i386", "product": { "name": "wireshark-0:1.0.15-7.el5_11.i386", "product_id": "wireshark-0:1.0.15-7.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-7.el5_11?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "product": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "product_id": "wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-7.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "product": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "product_id": "wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-7.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-0:1.0.15-7.el5_11.x86_64", "product": { "name": "wireshark-0:1.0.15-7.el5_11.x86_64", "product_id": "wireshark-0:1.0.15-7.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-7.el5_11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wireshark-0:1.0.15-7.el5_11.src", "product": { "name": "wireshark-0:1.0.15-7.el5_11.src", "product_id": "wireshark-0:1.0.15-7.el5_11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-7.el5_11?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "product": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "product_id": "wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-7.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.0.15-7.el5_11.s390x", "product": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.s390x", "product_id": "wireshark-gnome-0:1.0.15-7.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-7.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-0:1.0.15-7.el5_11.s390x", "product": { "name": "wireshark-0:1.0.15-7.el5_11.s390x", "product_id": "wireshark-0:1.0.15-7.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-7.el5_11?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "product": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "product_id": "wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-7.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.0.15-7.el5_11.ppc", "product": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.ppc", "product_id": "wireshark-gnome-0:1.0.15-7.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-7.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "wireshark-0:1.0.15-7.el5_11.ppc", "product": { "name": "wireshark-0:1.0.15-7.el5_11.ppc", "product_id": "wireshark-0:1.0.15-7.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-7.el5_11?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "product": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "product_id": "wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.0.15-7.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.0.15-7.el5_11.ia64", "product": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.ia64", "product_id": "wireshark-gnome-0:1.0.15-7.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.0.15-7.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "wireshark-0:1.0.15-7.el5_11.ia64", "product": { "name": "wireshark-0:1.0.15-7.el5_11.ia64", "product_id": "wireshark-0:1.0.15-7.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.0.15-7.el5_11?arch=ia64" } } } ], "category": "architecture", "name": "ia64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.src", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.src", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.src", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.0.15-7.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64" }, "product_reference": "wireshark-0:1.0.15-7.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.0.15-7.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" }, "product_reference": "wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-6421", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142611" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: RTP dissector crash (wnpa-sec-2014-12)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6421" }, { "category": "external", "summary": "RHBZ#1142611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6421", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6421" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6421", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6421" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-12.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-12.html" } ], "release_date": "2014-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T19:41:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1677" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: RTP dissector crash (wnpa-sec-2014-12)" }, { "cve": "CVE-2014-6422", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142611" } ], "notes": [ { "category": "description", "text": "The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: RTP dissector crash (wnpa-sec-2014-12)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6422" }, { "category": "external", "summary": "RHBZ#1142611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6422", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6422" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-12.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-12.html" } ], "release_date": "2014-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T19:41:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1677" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: RTP dissector crash (wnpa-sec-2014-12)" }, { "cve": "CVE-2014-6423", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142610" } ], "notes": [ { "category": "description", "text": "The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: MEGACO dissector infinite loop (wnpa-sec-2014-13)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6423" }, { "category": "external", "summary": "RHBZ#1142610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142610" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6423", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6423" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-13.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-13.html" } ], "release_date": "2014-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T19:41:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1677" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: MEGACO dissector infinite loop (wnpa-sec-2014-13)" }, { "cve": "CVE-2014-6425", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142608" } ], "notes": [ { "category": "description", "text": "The (1) get_quoted_string and (2) get_unquoted_string functions in epan/dissectors/packet-cups.c in the CUPS dissector in Wireshark 1.12.x before 1.12.1 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a CUPS packet that lacks a trailing \u0027\\0\u0027 character.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: CUPS dissector crash (wnpa-sec-2014-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6425" }, { "category": "external", "summary": "RHBZ#1142608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6425", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6425" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-15.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-15.html" } ], "release_date": "2014-08-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T19:41:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1677" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: CUPS dissector crash (wnpa-sec-2014-15)" }, { "cve": "CVE-2014-6428", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142603" } ], "notes": [ { "category": "description", "text": "The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: SES dissector crash (wnpa-sec-2014-18)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6428" }, { "category": "external", "summary": "RHBZ#1142603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142603" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6428", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6428" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-18.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-18.html" } ], "release_date": "2014-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T19:41:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1677" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: SES dissector crash (wnpa-sec-2014-18)" }, { "cve": "CVE-2014-6429", "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142602" } ], "notes": [ { "category": "description", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6429" }, { "category": "external", "summary": "RHBZ#1142602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6429", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6429" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-19.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-19.html" } ], "release_date": "2014-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T19:41:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1677" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)" }, { "cve": "CVE-2014-6430", "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142602" } ], "notes": [ { "category": "description", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6430" }, { "category": "external", "summary": "RHBZ#1142602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6430", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6430" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6430", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6430" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-19.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-19.html" } ], "release_date": "2014-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T19:41:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1677" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)" }, { "cve": "CVE-2014-6431", "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142602" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6431" }, { "category": "external", "summary": "RHBZ#1142602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6431", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6431" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-19.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-19.html" } ], "release_date": "2014-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T19:41:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1677" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)" }, { "cve": "CVE-2014-6432", "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142602" } ], "notes": [ { "category": "description", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6432" }, { "category": "external", "summary": "RHBZ#1142602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6432", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6432" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-19.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-19.html" } ], "release_date": "2014-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T19:41:40+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1677" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Client-Workstation-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Client-Workstation-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.src", "5Server-5.11.Z:wireshark-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-debuginfo-0:1.0.15-7.el5_11.x86_64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.i386", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ia64", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.ppc", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.s390x", "5Server-5.11.Z:wireshark-gnome-0:1.0.15-7.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)" } ] }
rhsa-2014:1676
Vulnerability from csaf_redhat
Published
2014-10-21 20:22
Modified
2024-11-22 08:33
Summary
Red Hat Security Advisory: wireshark security update
Notes
Topic
Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Wireshark is a network protocol analyzer. It is used to capture and browse
the traffic running on a computer network.
Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash or,
possibly, execute arbitrary code as the user running Wireshark.
(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)
Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423,
CVE-2014-6424, CVE-2014-6425, CVE-2014-6426, CVE-2014-6427, CVE-2014-6428)
All wireshark users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. All running instances
of Wireshark must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated wireshark packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Wireshark is a network protocol analyzer. It is used to capture and browse\nthe traffic running on a computer network.\n\nMultiple flaws were found in Wireshark. If Wireshark read a malformed\npacket off a network or opened a malicious dump file, it could crash or,\npossibly, execute arbitrary code as the user running Wireshark.\n(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)\n\nSeveral denial of service flaws were found in Wireshark. Wireshark could\ncrash or stop responding if it read a malformed packet off a network, or\nopened a malicious dump file. (CVE-2014-6421, CVE-2014-6422, CVE-2014-6423,\nCVE-2014-6424, CVE-2014-6425, CVE-2014-6426, CVE-2014-6427, CVE-2014-6428)\n\nAll wireshark users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. All running instances\nof Wireshark must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1676", "url": "https://access.redhat.com/errata/RHSA-2014:1676" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1142602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142602" }, { "category": "external", "summary": "1142603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142603" }, { "category": "external", "summary": "1142604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142604" }, { "category": "external", "summary": "1142606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142606" }, { "category": "external", "summary": "1142608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142608" }, { "category": "external", "summary": "1142609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142609" }, { "category": "external", "summary": "1142610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142610" }, { "category": "external", "summary": "1142611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142611" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1676.json" } ], "title": "Red Hat Security Advisory: wireshark security update", "tracking": { "current_release_date": "2024-11-22T08:33:45+00:00", "generator": { "date": "2024-11-22T08:33:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1676", "initial_release_date": "2014-10-21T20:22:28+00:00", "revision_history": [ { "date": "2014-10-21T20:22:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-21T20:22:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:33:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wireshark-0:1.8.10-8.el6_6.src", "product": { "name": "wireshark-0:1.8.10-8.el6_6.src", "product_id": "wireshark-0:1.8.10-8.el6_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.8.10-8.el6_6?arch=src" } } }, { "category": "product_version", "name": "wireshark-0:1.10.3-12.el7_0.src", "product": { "name": "wireshark-0:1.10.3-12.el7_0.src", "product_id": "wireshark-0:1.10.3-12.el7_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.10.3-12.el7_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-0:1.8.10-8.el6_6.i686", "product": { "name": "wireshark-devel-0:1.8.10-8.el6_6.i686", "product_id": "wireshark-devel-0:1.8.10-8.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.8.10-8.el6_6?arch=i686" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "product": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "product_id": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.8.10-8.el6_6?arch=i686" } } }, { "category": "product_version", "name": "wireshark-0:1.8.10-8.el6_6.i686", "product": { "name": "wireshark-0:1.8.10-8.el6_6.i686", "product_id": "wireshark-0:1.8.10-8.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.8.10-8.el6_6?arch=i686" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.8.10-8.el6_6.i686", "product": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.i686", "product_id": "wireshark-gnome-0:1.8.10-8.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.8.10-8.el6_6?arch=i686" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "product": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "product_id": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.10.3-12.el7_0?arch=i686" } } }, { "category": "product_version", "name": "wireshark-devel-0:1.10.3-12.el7_0.i686", "product": { "name": "wireshark-devel-0:1.10.3-12.el7_0.i686", "product_id": "wireshark-devel-0:1.10.3-12.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.10.3-12.el7_0?arch=i686" } } }, { "category": "product_version", "name": "wireshark-0:1.10.3-12.el7_0.i686", "product": { "name": "wireshark-0:1.10.3-12.el7_0.i686", "product_id": "wireshark-0:1.10.3-12.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.10.3-12.el7_0?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "wireshark-devel-0:1.8.10-8.el6_6.x86_64", "product": { "name": "wireshark-devel-0:1.8.10-8.el6_6.x86_64", "product_id": "wireshark-devel-0:1.8.10-8.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.8.10-8.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "product": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "product_id": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.8.10-8.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-0:1.8.10-8.el6_6.x86_64", "product": { "name": "wireshark-0:1.8.10-8.el6_6.x86_64", "product_id": "wireshark-0:1.8.10-8.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.8.10-8.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "product": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "product_id": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.8.10-8.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "product": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "product_id": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.10.3-12.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-devel-0:1.10.3-12.el7_0.x86_64", "product": { "name": "wireshark-devel-0:1.10.3-12.el7_0.x86_64", "product_id": "wireshark-devel-0:1.10.3-12.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.10.3-12.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-0:1.10.3-12.el7_0.x86_64", "product": { "name": "wireshark-0:1.10.3-12.el7_0.x86_64", "product_id": "wireshark-0:1.10.3-12.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.10.3-12.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "product": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "product_id": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.10.3-12.el7_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wireshark-0:1.8.10-8.el6_6.s390x", "product": { "name": "wireshark-0:1.8.10-8.el6_6.s390x", "product_id": "wireshark-0:1.8.10-8.el6_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.8.10-8.el6_6?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.8.10-8.el6_6.s390x", "product": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.s390x", "product_id": "wireshark-gnome-0:1.8.10-8.el6_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.8.10-8.el6_6?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "product": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "product_id": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.8.10-8.el6_6?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-devel-0:1.8.10-8.el6_6.s390x", "product": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390x", "product_id": "wireshark-devel-0:1.8.10-8.el6_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.8.10-8.el6_6?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-0:1.10.3-12.el7_0.s390x", "product": { "name": "wireshark-0:1.10.3-12.el7_0.s390x", "product_id": "wireshark-0:1.10.3-12.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.10.3-12.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "product": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "product_id": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.10.3-12.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.10.3-12.el7_0.s390x", "product": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.s390x", "product_id": "wireshark-gnome-0:1.10.3-12.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.10.3-12.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "wireshark-devel-0:1.10.3-12.el7_0.s390x", "product": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390x", "product_id": "wireshark-devel-0:1.10.3-12.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.10.3-12.el7_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wireshark-0:1.8.10-8.el6_6.s390", "product": { "name": "wireshark-0:1.8.10-8.el6_6.s390", "product_id": "wireshark-0:1.8.10-8.el6_6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.8.10-8.el6_6?arch=s390" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "product": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "product_id": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.8.10-8.el6_6?arch=s390" } } }, { "category": "product_version", "name": "wireshark-devel-0:1.8.10-8.el6_6.s390", "product": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390", "product_id": "wireshark-devel-0:1.8.10-8.el6_6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.8.10-8.el6_6?arch=s390" } } }, { "category": "product_version", "name": "wireshark-0:1.10.3-12.el7_0.s390", "product": { "name": "wireshark-0:1.10.3-12.el7_0.s390", "product_id": "wireshark-0:1.10.3-12.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.10.3-12.el7_0?arch=s390" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "product": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "product_id": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.10.3-12.el7_0?arch=s390" } } }, { "category": "product_version", "name": "wireshark-devel-0:1.10.3-12.el7_0.s390", "product": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390", "product_id": "wireshark-devel-0:1.10.3-12.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.10.3-12.el7_0?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "wireshark-0:1.8.10-8.el6_6.ppc64", "product": { "name": "wireshark-0:1.8.10-8.el6_6.ppc64", "product_id": "wireshark-0:1.8.10-8.el6_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.8.10-8.el6_6?arch=ppc64" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "product": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "product_id": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.8.10-8.el6_6?arch=ppc64" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "product": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "product_id": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.8.10-8.el6_6?arch=ppc64" } } }, { "category": "product_version", "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc64", "product": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc64", "product_id": "wireshark-devel-0:1.8.10-8.el6_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.8.10-8.el6_6?arch=ppc64" } } }, { "category": "product_version", "name": "wireshark-0:1.10.3-12.el7_0.ppc64", "product": { "name": "wireshark-0:1.10.3-12.el7_0.ppc64", "product_id": "wireshark-0:1.10.3-12.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.10.3-12.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "product": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "product_id": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.10.3-12.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "product": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "product_id": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-gnome@1.10.3-12.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc64", "product": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc64", "product_id": "wireshark-devel-0:1.10.3-12.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.10.3-12.el7_0?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wireshark-0:1.8.10-8.el6_6.ppc", "product": { "name": "wireshark-0:1.8.10-8.el6_6.ppc", "product_id": "wireshark-0:1.8.10-8.el6_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.8.10-8.el6_6?arch=ppc" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "product": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "product_id": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.8.10-8.el6_6?arch=ppc" } } }, { "category": "product_version", "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc", "product": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc", "product_id": "wireshark-devel-0:1.8.10-8.el6_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.8.10-8.el6_6?arch=ppc" } } }, { "category": "product_version", "name": "wireshark-0:1.10.3-12.el7_0.ppc", "product": { "name": "wireshark-0:1.10.3-12.el7_0.ppc", "product_id": "wireshark-0:1.10.3-12.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark@1.10.3-12.el7_0?arch=ppc" } } }, { "category": "product_version", "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "product": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "product_id": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-debuginfo@1.10.3-12.el7_0?arch=ppc" } } }, { "category": "product_version", "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc", "product": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc", "product_id": "wireshark-devel-0:1.10.3-12.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/wireshark-devel@1.10.3-12.el7_0?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.src", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.src", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.src", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-devel-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64" }, "product_reference": "wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.src", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.src", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-devel-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-devel-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" }, "product_reference": "wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-6421", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142611" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: RTP dissector crash (wnpa-sec-2014-12)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6421" }, { "category": "external", "summary": "RHBZ#1142611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6421", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6421" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6421", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6421" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-12.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-12.html" } ], "release_date": "2014-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: RTP dissector crash (wnpa-sec-2014-12)" }, { "cve": "CVE-2014-6422", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142611" } ], "notes": [ { "category": "description", "text": "The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: RTP dissector crash (wnpa-sec-2014-12)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6422" }, { "category": "external", "summary": "RHBZ#1142611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6422", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6422" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-12.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-12.html" } ], "release_date": "2014-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: RTP dissector crash (wnpa-sec-2014-12)" }, { "cve": "CVE-2014-6423", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142610" } ], "notes": [ { "category": "description", "text": "The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: MEGACO dissector infinite loop (wnpa-sec-2014-13)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6423" }, { "category": "external", "summary": "RHBZ#1142610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142610" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6423", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6423" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-13.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-13.html" } ], "release_date": "2014-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: MEGACO dissector infinite loop (wnpa-sec-2014-13)" }, { "cve": "CVE-2014-6424", "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142609" } ], "notes": [ { "category": "description", "text": "The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: Netflow dissector crash (wnpa-sec-2014-14)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6424" }, { "category": "external", "summary": "RHBZ#1142609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6424", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6424" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-14.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-14.html" } ], "release_date": "2014-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: Netflow dissector crash (wnpa-sec-2014-14)" }, { "cve": "CVE-2014-6425", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142608" } ], "notes": [ { "category": "description", "text": "The (1) get_quoted_string and (2) get_unquoted_string functions in epan/dissectors/packet-cups.c in the CUPS dissector in Wireshark 1.12.x before 1.12.1 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a CUPS packet that lacks a trailing \u0027\\0\u0027 character.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: CUPS dissector crash (wnpa-sec-2014-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6425" }, { "category": "external", "summary": "RHBZ#1142608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6425", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6425" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-15.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-15.html" } ], "release_date": "2014-08-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: CUPS dissector crash (wnpa-sec-2014-15)" }, { "cve": "CVE-2014-6426", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142606" } ], "notes": [ { "category": "description", "text": "The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: HIP dissector infinite loop (wnpa-sec-2014-16)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6426" }, { "category": "external", "summary": "RHBZ#1142606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6426", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6426" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-16.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-16.html" } ], "release_date": "2014-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: HIP dissector infinite loop (wnpa-sec-2014-16)" }, { "cve": "CVE-2014-6427", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142604" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: RTSP dissector crash (wnpa-sec-2014-17)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6427" }, { "category": "external", "summary": "RHBZ#1142604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142604" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6427", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6427" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-17.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-17.html" } ], "release_date": "2014-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: RTSP dissector crash (wnpa-sec-2014-17)" }, { "cve": "CVE-2014-6428", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142603" } ], "notes": [ { "category": "description", "text": "The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: SES dissector crash (wnpa-sec-2014-18)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6428" }, { "category": "external", "summary": "RHBZ#1142603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142603" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6428", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6428" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-18.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-18.html" } ], "release_date": "2014-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: SES dissector crash (wnpa-sec-2014-18)" }, { "cve": "CVE-2014-6429", "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142602" } ], "notes": [ { "category": "description", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6429" }, { "category": "external", "summary": "RHBZ#1142602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6429", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6429" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-19.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-19.html" } ], "release_date": "2014-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)" }, { "cve": "CVE-2014-6430", "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142602" } ], "notes": [ { "category": "description", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6430" }, { "category": "external", "summary": "RHBZ#1142602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6430", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6430" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6430", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6430" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-19.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-19.html" } ], "release_date": "2014-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)" }, { "cve": "CVE-2014-6431", "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142602" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6431" }, { "category": "external", "summary": "RHBZ#1142602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6431", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6431" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-19.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-19.html" } ], "release_date": "2014-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)" }, { "cve": "CVE-2014-6432", "discovery_date": "2014-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1142602" } ], "notes": [ { "category": "description", "text": "The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-6432" }, { "category": "external", "summary": "RHBZ#1142602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-6432", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6432" }, { "category": "external", "summary": "https://www.wireshark.org/security/wnpa-sec-2014-19.html", "url": "https://www.wireshark.org/security/wnpa-sec-2014-19.html" } ], "release_date": "2014-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-21T20:22:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1676" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Client-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Client-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Server-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Server-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.src", "6Workstation-optional-6.6.z:wireshark-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-debuginfo-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-devel-0:1.8.10-8.el6_6.x86_64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.i686", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.ppc64", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.s390x", "6Workstation-optional-6.6.z:wireshark-gnome-0:1.8.10-8.el6_6.x86_64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Client-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Client-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Server-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Server-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.src", "7Workstation-optional-7.0.Z:wireshark-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-debuginfo-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.i686", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-devel-0:1.10.3-12.el7_0.x86_64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.ppc64", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.s390x", "7Workstation-optional-7.0.Z:wireshark-gnome-0:1.10.3-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)" } ] }
gsd-2014-6421
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-6421", "description": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "id": "GSD-2014-6421", "references": [ "https://www.suse.com/security/cve/CVE-2014-6421.html", "https://access.redhat.com/errata/RHSA-2014:1677", "https://access.redhat.com/errata/RHSA-2014:1676", "https://advisories.mageia.org/CVE-2014-6421.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-6421.html", "https://linux.oracle.com/cve/CVE-2014-6421.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-6421" ], "details": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.", "id": "GSD-2014-6421", "modified": "2023-12-13T01:22:50.518836Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6421", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://linux.oracle.com/errata/ELSA-2014-1676", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-1676" }, { "name": "61933", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61933" }, { "name": "openSUSE-SU-2014:1249", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" }, { "name": "RHSA-2014:1677", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html" }, { "name": "RHSA-2014:1676", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920" }, { "name": "SUSE-SU-2014:1221", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" }, { "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=04c05a21e34cec326f1aff2f5f8a6e74e1ced984", "refsource": "CONFIRM", "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=04c05a21e34cec326f1aff2f5f8a6e74e1ced984" }, { "name": "60280", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60280" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1677", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-1677" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2014-12.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2014-12.html" }, { "name": "61929", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61929" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6421" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920", "refsource": "CONFIRM", "tags": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920" }, { "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=04c05a21e34cec326f1aff2f5f8a6e74e1ced984", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=04c05a21e34cec326f1aff2f5f8a6e74e1ced984" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2014-12.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.wireshark.org/security/wnpa-sec-2014-12.html" }, { "name": "openSUSE-SU-2014:1249", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" }, { "name": "SUSE-SU-2014:1221", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html" }, { "name": "60280", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60280" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1676", "refsource": "CONFIRM", "tags": [], "url": "http://linux.oracle.com/errata/ELSA-2014-1676" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1677", "refsource": "CONFIRM", "tags": [], "url": "http://linux.oracle.com/errata/ELSA-2014-1677" }, { "name": "61929", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61929" }, { "name": "61933", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61933" }, { "name": "RHSA-2014:1677", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html" }, { "name": "RHSA-2014:1676", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2014-11-05T08:28Z", "publishedDate": "2014-09-20T10:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…