{"affected":[{"ecosystem_specific":{"binaries":[{"wireshark":"1.12.13-0.23.1","wireshark-devel":"1.12.13-0.23.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP4","name":"wireshark","purl":"pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.13-0.23.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"wireshark":"1.12.13-0.23.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"wireshark","purl":"pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.13-0.23.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"wireshark":"1.12.13-0.23.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"wireshark","purl":"pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12.13-0.23.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update to wireshark 1.12.13 fixes the following issues:\n\n - CVE-2016-6504: wireshark: NDS dissector crash (bsc#991012)\n - CVE-2016-6505: wireshark: PacketBB dissector could divide by zero (bsc#991013)\n - CVE-2016-6506: wireshark: WSP infinite loop (bsc#991015)\n - CVE-2016-6507: wireshark: MMSE infinite loop (bsc#991016)\n - CVE-2016-6508: wireshark: RLC long loop (bsc#991017)\n - CVE-2016-6509: wireshark: LDSS dissector crash (bsc#991018)\n - CVE-2016-6510: wireshark: RLC dissector crash (bsc#991019)\n - CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)\n - CVE-2016-5350: SPOOLS infinite loop (bsc#983671)\n - CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671)\n - CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671)\n - CVE-2016-5353: UMTS FP crash (bsc#983671)\n - CVE-2016-5354: USB dissector crash (bsc#983671)\n - CVE-2016-5355: Toshiba file parser crash (bsc#983671)\n - CVE-2016-5356: CoSine file parser crash (bsc#983671)\n - CVE-2016-5357: NetScreen file parser crash (bsc#983671)\n - CVE-2016-5358: Ethernet dissector crash (bsc#983671)\n - CVE-2016-5359: WBXML infinite loop (bsc#983671)\n\nFor more details please see:\n  https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html\n  https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html\n\n","id":"SUSE-SU-2016:2212-1","modified":"2016-09-02T07:00:12Z","published":"2016-09-02T07:00:12Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162212-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/983671"},{"type":"REPORT","url":"https://bugzilla.suse.com/991012"},{"type":"REPORT","url":"https://bugzilla.suse.com/991013"},{"type":"REPORT","url":"https://bugzilla.suse.com/991015"},{"type":"REPORT","url":"https://bugzilla.suse.com/991016"},{"type":"REPORT","url":"https://bugzilla.suse.com/991017"},{"type":"REPORT","url":"https://bugzilla.suse.com/991018"},{"type":"REPORT","url":"https://bugzilla.suse.com/991019"},{"type":"REPORT","url":"https://bugzilla.suse.com/991020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5351"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5353"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5354"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5356"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5357"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5358"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5359"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6504"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6505"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6506"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6507"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6508"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6509"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6510"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6511"}],"related":["CVE-2016-5350","CVE-2016-5351","CVE-2016-5352","CVE-2016-5353","CVE-2016-5354","CVE-2016-5355","CVE-2016-5356","CVE-2016-5357","CVE-2016-5358","CVE-2016-5359","CVE-2016-6504","CVE-2016-6505","CVE-2016-6506","CVE-2016-6507","CVE-2016-6508","CVE-2016-6509","CVE-2016-6510","CVE-2016-6511"],"summary":"Security update for wireshark","upstream":["CVE-2016-5350","CVE-2016-5351","CVE-2016-5352","CVE-2016-5353","CVE-2016-5354","CVE-2016-5355","CVE-2016-5356","CVE-2016-5357","CVE-2016-5358","CVE-2016-5359","CVE-2016-6504","CVE-2016-6505","CVE-2016-6506","CVE-2016-6507","CVE-2016-6508","CVE-2016-6509","CVE-2016-6510","CVE-2016-6511"]}