Source: wireshark
Version: 2.6.6-1
Severity: important
Tags: security upstream
Control: found -1 2.6.5-1~deb9u1

Hi,

The following vulnerabilities were published for wireshark.

CVE-2019-9208[0]:
| In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector
| could crash. This was addressed in epan/dissectors/asn1/tcap/tcap.cnf
| by avoiding NULL pointer dereferences.

CVE-2019-9209[1]:
| In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and
| related dissectors could crash. This was addressed in
| epan/dissectors/packet-ber.c by preventing a buffer overflow associated
| with excessive digits in time values.

CVE-2019-9214[2]:
| In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector
| could crash. This was addressed in epan/dissectors/packet-rpcap.c by
| avoiding an attempted dereference of a NULL conversation.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-9208
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9208
[1] https://security-tracker.debian.org/tracker/CVE-2019-9209
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9209
[2] https://security-tracker.debian.org/tracker/CVE-2019-9214
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9214

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to