Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

wnpa-sec-2009-06 · Multiple vulnerabilities in Wireshark

Summary

Name: Multiple vulnerabilities in Wireshark

Docid: wnpa-sec-2009-06

Date: September 15, 2009

Affected versions: 0.99.6 up to and including 1.2.1

Fixed versions: 1.2.2

Details

Description

Wireshark 1.2.2 fixes the following vulnerabilities:

  • The GSM A RR dissector could crash. (Bug 3893)
    Versions affected: 1.2.0 to 1.2.1
  • The OpcUa dissector could use excessive CPU and memory. (Bug 3986)
    Versions affected: 0.99.6 to 1.0.8, 1.2.0 to 1.2.1
  • The TLS dissector could crash on some platforms. (Bug 4008)
    Versions affected: 1.2.0 to 1.2.1

Impact

It may be possible to make Wireshark crash remotely or by convincing someone to read a malformed packet trace file.

Resolution

Upgrade to Wireshark 1.2.2 or later.

If are running Wireshark {{ end_version }} or earlier (including Ethereal) and cannot upgrade, you can work around each of the problems listed above by doing the following:

  • Disable the affected dissectors:
    • Select Analyze→Enabled Protocols... from the menu.
    • Make sure "GSM CCCH", "OpcUa", and "SSL" are all un-checked.
    • Click "Save", then click "OK".