Description
Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.
The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.
The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.
The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.
Impact
None. F5 products are not affected by these vulnerabilities.
Status
To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:
Product | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature |
---|---|---|---|---|
BIG-IP LTM | None | |||
11.0.0 - 11.6.0 | ||||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP AAM | None | 11.4.0 - 11.6.0 | ||
Not vulnerable | None | |||
BIG-IP AFM | None | 11.3.0 - 11.6.0 | ||
Not vulnerable | None | |||
BIG-IP Analytics | None | 11.0.0 - 11.6.0 | ||
Not vulnerable | None | |||
BIG-IP APM | None | 11.0.0 - 11.6.0 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP ASM | None | 11.0.0 - 11.6.0 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP Edge Gateway | ||||
None | 11.0.0 - 11.3.0 | |||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP GTM | None | 11.0.0 - 11.6.0 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP Link Controller | None | |||
11.0.0 - 11.6.0 | ||||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP PEM | None | |||
11.3.0 - 11.6.0 | ||||
Not vulnerable | None | |||
BIG-IP PSM | None | 11.0.0 - 11.4.1 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP WebAccelerator | None | 11.0.0 - 11.3.0 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
BIG-IP WOM | None | 11.0.0 - 11.3.0 | ||
10.1.0 - 10.2.4 | ||||
Not vulnerable | None | |||
ARX | None | 6.0.0 - 6.4.0 | ||
Not vulnerable | None | |||
Enterprise Manager | None | 3.1.1 | ||
Not vulnerable | None | |||
FirePass | None | 7.0.0 | ||
6.0.0 - 6.1.0 | ||||
Not vulnerable | None | |||
BIG-IQ Cloud | None | |||
4.0.0 - 4.5.0 | ||||
Not vulnerable | None | |||
BIG-IQ Device | None | |||
4.2.0 - 4.5.0 | ||||
Not vulnerable | None | |||
BIG-IQ Security | None | |||
4.0.0 - 4.5.0 | ||||
Not vulnerable | None | |||
BIG-IQ ADC | None | |||
4.5.0 | ||||
Not vulnerable | None | |||
LineRate | None | |||
2.6.0 | ||||
2.5.0 - 2.5.1 | ||||
Not vulnerable | None | |||
F5 WebSafe | None | |||
1.0.0 | ||||
Not vulnerable | None | |||
Traffix SDC | None | |||
4.0.0 - 4.4.0 | ||||
3.3.2 - 3.5.1 | ||||
Not vulnerable | None |
Note: As of February 17, 2015, AskF5 Security Advisory articles include the Severity value. Security Advisory articles published before this date do not list a Severity value.
Recommended Action
None
Supplemental Information