Linux Security
Linux Security
Linux Security

Debian: DSA-2101-1: New wireshark packages fix several vulnerabilities

Date 31 Aug 2010
Posted By LinuxSecurity Advisories
Several implementation errors in the dissector of the Wireshark network traffic analyzer for the ASN.1 BER protocol and in the SigComp Universal Decompressor Virtual Machine may lead to the execution of arbitrary code.
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-2101-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
August 31, 2010             
- ------------------------------------------------------------------------

Package        : wireshark
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2010-2994 CVE-2010-2995

Several implementation errors in the dissector of the Wireshark network
traffic analyzer for the ASN.1 BER protocol and in the SigComp Universal
Decompressor Virtual Machine may lead to the execution of arbitrary code.

For the stable distribution (lenny), these problems have been fixed in
version 1.0.2-3+lenny10.

For the unstable distribution (sid), these problems have been fixed in
version 1.2.10-1.

We recommend that you upgrade your wireshark packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
    Size/MD5 checksum: 16935492 1834437f7c6dbed02082e7757133047d
    Size/MD5 checksum:   119766 5a4194b36f275740420e6976a3cf4801
    Size/MD5 checksum:     1506 8c8b1b6eb5746bb12f3a31606279d2a4

alpha architecture (DEC Alpha)
    Size/MD5 checksum: 12098048 c6037e2144a2b606c89666a38bba255d
    Size/MD5 checksum:   127062 0ed9502cbcfafb5f40092dfb85bd1452
    Size/MD5 checksum:   731182 7d68066a76be15c23097c467591a71d7
    Size/MD5 checksum:   570002 ef363dd7b6e59f55ac352dd7f476271f

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:   659672 93affb6b939d97543c0a2ee094eb7bcf
    Size/MD5 checksum: 11867538 e26471505e2511c44915167d9df30b2c
    Size/MD5 checksum:   119270 3507f87aae6c6eb333f5d6675557ffea
    Size/MD5 checksum:   568816 5c2bde00638f8be32513abe1c9b861f9

arm architecture (ARM)
    Size/MD5 checksum: 10214680 bc5423c9321f4790707c2be839f48029
    Size/MD5 checksum:   111310 3c7a4f2daba42dec5e4e5b0cad3c8ba4
    Size/MD5 checksum:   614450 ba489525ee84174cf3e9fb7a40f89d14
    Size/MD5 checksum:   584538 1a02fc4e91ce9d386bb8ed1e7902c280

armel architecture (ARM EABI)
    Size/MD5 checksum:   620126 27ace8479a33a8d685f019fa563d3afa
    Size/MD5 checksum: 10219808 ef603f9abcd981feb550a6f328592eba
    Size/MD5 checksum:   586342 7929f0643a92cb084568da2e32ada209
    Size/MD5 checksum:   113602 e459df96b13b2321ea4ac2b7ca055a55

hppa architecture (HP PA RISC)
    Size/MD5 checksum:   121180 7cc1f3a0fe508449031c851142b5c4d3
    Size/MD5 checksum: 13271640 6bbfc0d14d3bb8c46b35a40523139c5f
    Size/MD5 checksum:   584306 c77db073cd347903377d301d656ec3b6
    Size/MD5 checksum:   694870 5c35736053a02a728cc9263cea544118

i386 architecture (Intel ia32)
    Size/MD5 checksum:   583572 3c416afdc0bed67389798748ac82dab1
    Size/MD5 checksum:   619668 b279bae201515f07f50b789fe9208ee3
    Size/MD5 checksum:   111708 bd19cc8a584292771ce8b37a934b6759
    Size/MD5 checksum: 10109862 4a6846b885178fd578ecc6dc3b284172

ia64 architecture (Intel ia64)
    Size/MD5 checksum:   568824 dabad8c92b646ce5bdf5ac4369593b1a
    Size/MD5 checksum:   154666 185f3441d66fcf3ce9c781dc061e4961
    Size/MD5 checksum:   931572 a74e996b87300057ef62722bdccf072c
    Size/MD5 checksum: 13684804 ec46eeb74513b1c42288f0c186313505

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum: 10424544 8f76ad6d63aecdb627850b2729655b3e
    Size/MD5 checksum:   636682 909599c2175d06ba483baac5fbef9715
    Size/MD5 checksum:   113264 333e8a51080d13136689b9786e4d0061
    Size/MD5 checksum:   585810 921806111c71ed490ff18e05ef5383c7

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:   113454 9602da05aa4bc7a22432bcd720660cc0
    Size/MD5 checksum:   570006 1e8cb3f56fa73956d52268d237c15baf
    Size/MD5 checksum:   627162 2ef6443e548130d6d7f3e7bdf0176b6a
    Size/MD5 checksum:  9729736 fa8030ec05b4e395f0ba3c90ee670e46

powerpc architecture (PowerPC)
    Size/MD5 checksum:   582794 f2e0c6a4336e42c023c4f1db3dc00dd8
    Size/MD5 checksum:   677742 0dda6ce349cf9e844e7ba074765ab682
    Size/MD5 checksum: 11220016 5e5f2754bef30795bdab7486c5dd8a72
    Size/MD5 checksum:   122572 ac15689cd78a06ac3472760c10a253af

s390 architecture (IBM S/390)
    Size/MD5 checksum: 12488184 b916661193fbbdef2e6838f5e144e0c4
    Size/MD5 checksum:   122150 fa1d1a623a2cd95b2d59f5d910226086
    Size/MD5 checksum:   569966 9c91e4417d2860da5e9903410f92d775
    Size/MD5 checksum:   671588 c2f017d2cb7bdd3a8c7c5f85aef2df6f

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum: 11287328 d4bb52efa605646c1c207565c9c1eb77
    Size/MD5 checksum:   583744 803661967720b8f8d048844afef3a6b3
    Size/MD5 checksum:   113520 0f733a8ef1549c573cf4055ee37e1842
    Size/MD5 checksum:   629600 f7ed1aa09cb192c7d8f844cfc7fae2bc

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"69","type":"x","order":"1","pct":75.82,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"14","type":"x","order":"2","pct":15.38,"resources":[]},{"id":"181","title":"Hardly ever","votes":"8","type":"x","order":"3","pct":8.79,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.