Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

wnpa-sec-2009-02 · Multiple problems in Wireshark

Summary

Name: Multiple problems in Wireshark

Docid: wnpa-sec-2009-02

Date: April 6, 2009

Affected versions: 0.9.6 up to and including 1.0.6

Fixed versions: 1.0.7

Details

Description

Wireshark 1.0.7 fixes the following vulnerabilities:

  • The PROFINET dissector was vulnerable to a format string overflow. (Bug 3382) Versions affected: 0.99.6 to 1.0.6 CVE-2009-1210
  • The LDAP dissector could crash on Windows. (Bug 3262) Versions affected: 0.99.2 to 1.0.6 CVE-2009-1267
  • The Check Point High-Availability Protocol (CPHAP) dissector could crash. (Bug 3269) Versions affected: 0.9.6 to 1.0.6 CVE-2009-1268
  • Wireshark could crash while loading a Tektronix .rf5 file. (Bug 3366) Versions affected: 0.99.6 to 1.0.6 CVE-2009-1269

Impact

It may be possible to make Wireshark crash by altering the HOME environment variable or by convincing someone to read a malformed packet trace file.

Resolution

Upgrade to Wireshark 1.0.7 or later.

If are running Wireshark {{ end_version }} or earlier (including Ethereal 0.99.0) and cannot upgrade, you can work around each of the problems listed above by doing the following:

  • For each user that will run Wireshark (including root if you're running Wireshark as a privileged user), make sure the HOME environment variable doesnt' contain any "%" characters.
  • Don't open any Tektronix K12 text or NetScreen capture files.