-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0338
Wireshark 3.4.3 is now available
1 February 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: wireshark
Publisher: Wireshark
Operating System: UNIX variants (UNIX, Linux, OSX)
Windows
Impact/Access: Reduced Security -- Unknown/Unspecified
Resolution: Patch/Upgrade
CVE Names: CVE-2021-22174 CVE-2021-22173
Original Bulletin:
https://www.wireshark.org/lists/wireshark-announce/202101/msg00000.html
- --------------------------BEGIN INCLUDED TEXT--------------------
I'm proud to announce the release of Wireshark 3.4.3.
What is Wireshark?
Wireshark is the world's most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
What's New
The Windows installers now ship with Npcap 1.10. They previously
shipped with Npcap 1.00.
Bug Fixes
The following vulnerabilities have been fixed:
o wnpa-sec-2021-01[1] USB HID dissector memory leak. Bug 17124[2].
CVE-2021-22173[3].
o wnpa-sec-2021-02[4] USB HID dissector crash. Bug 17165[5].
CVE-2021-22174[6].
The following bugs have been fixed:
o SIP response single-line multiple Contact-URIs decoding error Bug
13752[7].
o Adding filter while "Telephony->VoIP Calls->Flow Sequence" open
causes OOB memory reads and potential crashes. Bug 16952[8].
o QUIC packet not fully dissected Bug 17077[9].
o SOMEIP-SD hidden entries are off Bug 17091[10].
o Problem with calculation on UDP checksum in SRv6 Bug 17097[11].
o Dark mode not working in Wireshark 3.4.2 on macOS Bug 17098[12].
o Wireshark 3.4.0: build failure on older MacOS releases, due to
'CLOCK_REALTIME' Bug 17101[13].
o TECMP: Status Capture Module messages shows 3 instead of 2 bytes
for HW version Bug 17133[14].
o Documentation - editorial error - README.dissector bad reference
Bug 17141[15].
o Cannot save capture with comments to a format that doesn't
support it (no pop-up) Bug 17146[16].
o AUTOSAR-NM: PNI TF-String wrong way around Bug 17154[17].
o Fibre Channel parsing errors even with the fix for #17084 Bug
17168[18].
o f5ethtrailer: Won't find a trailer after an FCS that begins with
a 0x00 byte Bug 17171[19].
o f5ethtrailer: legacy format, low noise only, no vip name trailers
no longer detected Bug 17172[20].
o Buildbot crash output: fuzz-2021-01-22-3387835.pcap Bug
17174[21].
o Dissection error on large ZVT packets Bug 17177[22].
o TShark crashes with -T ek option Bug 17179[23].
New and Updated Features
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
AUTOSAR-NM, DHCPv6, DoIP, FC ELS, GQUIC, IPv6, NAS 5GS, NAS EPS,
QUIC, SIP, SOME/IP-SD, TECMP, TLS, TPNCP, USB HID, and ZVT
New and Updated Capture File Support
f5ethtrailer and pcapng
Getting Wireshark
Wireshark source code and installation packages are available from
https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
be found on the download page[24] on the Wireshark web site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
locations vary from platform to platform. You can use About -> Folders
to find the default locations on your system.
Getting Help
The User's Guide, manual pages and various other documentation can be
found at https://www.wireshark.org/docs/
Community support is available on Wireshark'sQ&A site[25] and on the
wireshark-users mailing list. Subscription information and archives
for all of Wireshark's mailing lists can be found on the web site[26].
Issues and feature requests can be reported on the issue tracker[27].
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site[28].
Last updated 2021-01-29 18:02:26 UTC
References
1. https://www.wireshark.org/security/wnpa-sec-2021-01
2. https://gitlab.com/wireshark/wireshark/-/issues/17124
3. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22173
4. https://www.wireshark.org/security/wnpa-sec-2021-02
5. https://gitlab.com/wireshark/wireshark/-/issues/17165
6. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22174
7. https://gitlab.com/wireshark/wireshark/-/issues/13752
8. https://gitlab.com/wireshark/wireshark/-/issues/16952
9. https://gitlab.com/wireshark/wireshark/-/issues/17077
10. https://gitlab.com/wireshark/wireshark/-/issues/17091
11. https://gitlab.com/wireshark/wireshark/-/issues/17097
12. https://gitlab.com/wireshark/wireshark/-/issues/17098
13. https://gitlab.com/wireshark/wireshark/-/issues/17101
14. https://gitlab.com/wireshark/wireshark/-/issues/17133
15. https://gitlab.com/wireshark/wireshark/-/issues/17141
16. https://gitlab.com/wireshark/wireshark/-/issues/17146
17. https://gitlab.com/wireshark/wireshark/-/issues/17154
18. https://gitlab.com/wireshark/wireshark/-/issues/17168
19. https://gitlab.com/wireshark/wireshark/-/issues/17171
20. https://gitlab.com/wireshark/wireshark/-/issues/17172
21. https://gitlab.com/wireshark/wireshark/-/issues/17174
22. https://gitlab.com/wireshark/wireshark/-/issues/17177
23. https://gitlab.com/wireshark/wireshark/-/issues/17179
24. https://www.wireshark.org/download.html#thirdparty
25. https://ask.wireshark.org/
26. https://www.wireshark.org/lists/
27. https://gitlab.com/wireshark/wireshark/-/issues
28. https://www.wireshark.org/faq.html
Digests
wireshark-3.4.3.tar.xz: 32287304 bytes
SHA256(wireshark-3.4.3.tar.xz)=f467cc77f0fc73fce0b854cdbc292f132d4879fca69d417eccad5f967fbf262b
RIPEMD160(wireshark-3.4.3.tar.xz)=6b4174c94fa9f111937ad075a5a7265fc98b0f41
SHA1(wireshark-3.4.3.tar.xz)=7dec4332f21827e360b5830d1d6d566365796a67
Wireshark-win64-3.4.3.exe: 61482312 bytes
SHA256(Wireshark-win64-3.4.3.exe)=3bb02427d9c29d7fc04bf011f2e4ebd4f23ebe68f275f51d4ae36ee167b6cb03
RIPEMD160(Wireshark-win64-3.4.3.exe)=137d9615b4aceb2ea48be43c2c87fbfef5d77f1c
SHA1(Wireshark-win64-3.4.3.exe)=506cd5ed2973b23106b067c3dd84dd82988c25a6
Wireshark-win32-3.4.3.exe: 56533576 bytes
SHA256(Wireshark-win32-3.4.3.exe)=6f99517f1e3c35be1de40ab9d333e6b3f053a60b7622798b171fef9e0da33c95
RIPEMD160(Wireshark-win32-3.4.3.exe)=f7fbf73dbf8a3aeda68898b71472ef465933a5a4
SHA1(Wireshark-win32-3.4.3.exe)=bf62c9b95863d77e85456d63f9341be6d744427b
Wireshark-win32-3.4.3.msi: 44769280 bytes
SHA256(Wireshark-win32-3.4.3.msi)=4a9e8dce82fb265fccf13e5864312f8af8dc199dfe8bd8b044683323a12064a3
RIPEMD160(Wireshark-win32-3.4.3.msi)=6db7ad54a15e4a16b6213645a5a3ccd1fa73f11c
SHA1(Wireshark-win32-3.4.3.msi)=e3e412933b2b4ac1c53e39ad7f2d4573216727bf
Wireshark-win64-3.4.3.msi: 49803264 bytes
SHA256(Wireshark-win64-3.4.3.msi)=191d7a4403689e94cd89c4468b0f8ee5e5ed81addac6faedd2912a5803a898d1
RIPEMD160(Wireshark-win64-3.4.3.msi)=13ec6d4cb59098574f790dc8efc52ef3062916c6
SHA1(Wireshark-win64-3.4.3.msi)=2c172244fe5c8edb78f03aa82f159a646dc19650
WiresharkPortable_3.4.3.paf.exe: 115216256 bytes
SHA256(WiresharkPortable_3.4.3.paf.exe)=e14e92708d99c691f8647cb23b8e43e6fc6ffdf2a417f0044684e94ea156b041
RIPEMD160(WiresharkPortable_3.4.3.paf.exe)=8b1f254f484d6911aa90b90c609daa484d039812
SHA1(WiresharkPortable_3.4.3.paf.exe)=b8dd1401ca77a3aab2245e95bc88266132fedc87
Wireshark 3.4.3 Intel 64.dmg: 130901551 bytes
SHA256(Wireshark 3.4.3 Intel 64.dmg)=d3574ea99758abed0fddacec8dcaf1e3c6b767e6e3651b93f4315d6d0d41c8f8
RIPEMD160(Wireshark 3.4.3 Intel 64.dmg)=dbfa7f7d6433790fff6e4e7fdafd8b64ed6b8da9
SHA1(Wireshark 3.4.3 Intel 64.dmg)=f44c22c86dcad1a9978f02da3aecee34f1ccbba8
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-win64-x.y.z.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z Intel 64.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=QIln
-----END PGP SIGNATURE-----
Read More
The post ESB-2021.0338 – [Win][UNIX/Linux] wireshark: Reduced security – Unknown/unspecified appeared first on Malware Devil.
https://malwaredevil.com/2021/02/01/esb-2021-0338-winunix-linux-wireshark-reduced-security-unknown-unspecified/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0338-winunix-linux-wireshark-reduced-security-unknown-unspecified