Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

wnpa-sec-2007-03 · Multiple problems in Wireshark (formerly Ethereal)

Summary

Name: Multiple problems in Wireshark (formerly Ethereal)

Docid: wnpa-sec-2007-03

Date: December 18, 2007

Affected versions: 0.8.16 up to and including 0.99.6

Fixed versions: 0.99.7

Details

Description

Wireshark 0.99.7 fixes the following vulnerabilities:

  • Wireshark could crash when reading an MP3 file.
    Versions affected: 0.99.6
  • Beyond Security discovered that Wireshark could loop excessively while reading a malformed DNP3 packet.
    Versions affected: 0.10.12 to 0.99.6
  • Stefan Esser discovered a buffer overflow in the SSL dissector.
    Versions affected: 0.99.0 to 0.99.6
  • The ANSI MAP dissector could be susceptible to a buffer overflow on some platforms. (Bug )
    Versions affected: 0.99.5 to 0.99.6
  • The Firebird/Interbase dissector could go into an infinite loop or crash. (Bugs and )
    Versions affected: 0.99.6
  • The NCP dissector could cause a crash.
    Versions affected: 0.99.6
  • The HTTP dissector could crash on some systems while decoding chunked messages.
    Versions affected: 0.10.14 to 0.99.6
  • The MEGACO dissector could enter a large loop and consume system resources.
    Versions affected: 0.9.14 to 0.99.6
  • The DCP ETSI dissector could enter a large loop and consume system resources.
    Versions affected: 0.99.6
  • Fabiodds discovered a buffer overflow in the iSeries (OS/400) Communication trace file parser. (Bug )
    Versions affected: 0.99.0 to 0.99.6
  • The PPP dissector could overflow a buffer.
    Versions affected: 0.99.6
  • The Bluetooth SDP dissector could go into an infinite loop.
    Versions affected: 0.99.2 to 0.99.6
  • A malformed RPC Portmap packet could cause a crash. (Bug )
    Versions affected: 0.8.16 to 0.99.6
  • The IPv6 dissector could loop excessively. (Bug ) Versions affected: 0.99.6
  • The USB dissector could loop excessively or crash. (Bugs , , and ) Versions affected: 0.99.6
  • The SMB dissector could crash. (Bug ) Versions affected: 0.99.6
  • The RPL dissector could go into an infinite loop. (Bug ) Versions affected: 0.9.8 to 0.99.6
  • The WiMAX dissector could crash due to unaligned access on some platforms. (Bug ) Versions affected: 0.99.6
  • The CIP dissector could attempt to allocate a huge amount of memory and crash. Versions affected: 0.9.14 to 0.99.6

Impact

It may be possible to make Wireshark or Ethereal crash or use up available memory by injecting a purposefully malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

Resolution

Upgrade to Wireshark 0.99.7.

If are running Wireshark 0.99.6 or Ethereal 0.99.0 or earlier and cannot upgrade, you can work around each of the problems listed above by doing the following:

  • Disable the HTTP, DCP ETSI, SSL, DHCP/BOOTP, and MMS dissectors.
    • Select Analyze→Enabled Protocols... from the menu.
    • Make sure "ANSI MAP", "BTSDP", "DCP (ETSI)", "DNP 3.0", "FB/IPB GDS DB", "HTTP", "MEGACO", "NCP", "PPP", "SSL" are un-checked.
    • Click "Save", then click "OK".