From owner-freebsd-ports-bugs@FreeBSD.ORG Tue Nov 2 16:00:20 2010 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 3128F1065672 for ; Tue, 2 Nov 2010 16:00:20 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id DC6698FC15 for ; Tue, 2 Nov 2010 16:00:19 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.4/8.14.4) with ESMTP id oA2G0Jxc048180 for ; Tue, 2 Nov 2010 16:00:19 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.4/8.14.4/Submit) id oA2G0JBW048177; Tue, 2 Nov 2010 16:00:19 GMT (envelope-from gnats) Resent-Date: Tue, 2 Nov 2010 16:00:19 GMT Resent-Message-Id: <201011021600.oA2G0JBW048177@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Eygene Ryabinkin Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 24A521065670 for ; Tue, 2 Nov 2010 15:52:09 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) Received: from 0.mx.codelabs.ru (0.mx.codelabs.ru [144.206.177.45]) by mx1.freebsd.org (Postfix) with ESMTP id BD3868FC13 for ; Tue, 2 Nov 2010 15:52:07 +0000 (UTC) Received: from void.codelabs.ru (void.codelabs.ru [144.206.177.25]) by 0.mx.codelabs.ru with esmtps (TLSv1:CAMELLIA256-SHA:256) id 1PDIzO-000PQ5-PN for FreeBSD-gnats-submit@freebsd.org; Tue, 02 Nov 2010 18:41:34 +0300 Message-Id: <20101102154134.99190DA81F@void.codelabs.ru> Date: Tue, 2 Nov 2010 18:41:34 +0300 (MSK) From: Eygene Ryabinkin To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: Subject: ports/151891: VuXML entry for CVE-2010-2010-3445 in Wireshark X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Eygene Ryabinkin List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 02 Nov 2010 16:00:20 -0000 >Number: 151891 >Category: ports >Synopsis: VuXML entry for CVE-2010-2010-3445 in Wireshark >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Nov 02 16:00:19 UTC 2010 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release: FreeBSD 9.0-CURRENT amd64 >Organization: Code Labs >Environment: System: FreeBSD 9.0-CURRENT amd64 >Description: There is a DoS in BER-based dissectors: [1]. It was fixed in 1.4.1 [2] and 1.2.12 [3]. FreeBSD ports now have 1.4.1 in the tree, so only VuXML entry is needed. >How-To-Repeat: [1] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5230 [2] http://www.wireshark.org/lists/wireshark-announce/201010/msg00002.html [3] http://www.wireshark.org/lists/wireshark-announce/201010/msg00001.html >Fix: The following VuXML entry should be evaluated and added: --- vuln.xml begins here --- Wireshark -- DoS in the BER-based dissectors wireshark 1.31.4.1 1.01.2.12 wireshark-lite 1.31.4.1 1.01.2.12 tshark 1.31.4.1 1.01.2.12 tshark-lite 1.31.4.1 1.01.2.12

Secunia reports:

A vulnerability has been discovered in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an infinite recursion error in the "dissect_unknown_ber()" function in epan/dissectors/packet-ber.c and can be exploited to cause a stack overflow e.g. via a specially crafted SNMP packet.

The vulnerability is confirmed in version 1.4.0 and reported in version 1.2.11 and prior and version 1.4.0 and prior.

CVE-2010-3445 http://www.wireshark.org/lists/wireshark-announce/201010/msg00002.html http://www.wireshark.org/lists/wireshark-announce/201010/msg00001.html 2010-09-16 TODAY
--- vuln.xml ends here --- It passes 'make validate' fine on my machine. >Release-Note: >Audit-Trail: >Unformatted: