{"id":"RHSA-2013:1569","summary":"Red Hat Security Advisory: wireshark security, bug fix, and enhancement update","modified":"2026-03-11T06:43:46.398654Z","published":"2024-09-15T20:59:18Z","upstream":["CVE-2012-2392","CVE-2012-3825","CVE-2012-4285","CVE-2012-4288","CVE-2012-4289","CVE-2012-4290","CVE-2012-4291","CVE-2012-4292","CVE-2012-5595","CVE-2012-5597","CVE-2012-5598","CVE-2012-5599","CVE-2012-5600","CVE-2012-6056","CVE-2012-6059","CVE-2012-6060","CVE-2012-6061","CVE-2012-6062","CVE-2013-3557","CVE-2013-3559","CVE-2013-3561","CVE-2013-4081","CVE-2013-4083","CVE-2013-4927","CVE-2013-4931","CVE-2013-4932","CVE-2013-4933","CVE-2013-4934","CVE-2013-4935","CVE-2013-4936","CVE-2013-5721"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"http://www.wireshark.org/docs/relnotes/wireshark-1.8.0.html"},{"type":"ARTICLE","url":"http://www.wireshark.org/docs/relnotes/wireshark-1.6.0.html"},{"type":"ARTICLE","url":"http://www.wireshark.org/docs/relnotes/wireshark-1.4.0.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=659661"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=711024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=715560"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=750712"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=824411"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=832021"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=836960"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=848541"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=848548"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=848561"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=848572"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=848575"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=848578"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=881742"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=881748"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=881771"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=881790"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=881809"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=889346"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=965190"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=965193"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=966331"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=972686"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=972688"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=990166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=990170"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=990172"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=990175"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=990178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=990179"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=990180"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007197"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1569.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-2392"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-2392"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2392"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-3825"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-3825"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3825"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-4285"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-4285"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4285"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-4288"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-4288"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4288"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-4289"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-4289"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4289"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-4290"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-4290"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4290"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-4291"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-4291"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4291"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-4292"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-4292"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4292"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-5595"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-5595"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5595"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-5597"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-5597"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5597"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-5598"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-5598"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5598"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-5599"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-5599"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5599"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-5600"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-5600"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5600"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-6056"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-6056"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6056"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-6059"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-6059"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6059"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-6060"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-6060"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6060"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-6061"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-6061"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6061"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-6062"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-6062"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6062"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-3557"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-3557"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3557"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-3559"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-3559"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3559"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-3561"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-3561"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3561"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4081"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4081"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4081"},{"type":"ARTICLE","url":"http://www.wireshark.org/security/wnpa-sec-2013-39.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4083"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4083"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4083"},{"type":"ARTICLE","url":"http://www.wireshark.org/security/wnpa-sec-2013-41.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4927"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4927"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4927"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4931"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4931"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4932"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4932"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4933"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4933"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4933"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4934"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4935"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4935"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4935"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4936"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4936"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4936"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-5721"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-5721"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-5721"}],"affected":[{"package":{"name":"wireshark","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/wireshark"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/wireshark-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark-devel","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/wireshark-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark-gnome","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/wireshark-gnome"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/wireshark"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/wireshark-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark-devel","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/wireshark-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark-gnome","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/wireshark-gnome"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/wireshark"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/wireshark-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark-devel","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/wireshark-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}},{"package":{"name":"wireshark-gnome","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/wireshark-gnome"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.8.10-4.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1569.json"}}],"schema_version":"1.7.5"}