{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for wireshark","title":"Title of the patch"},{"category":"description","text":"\n    \nwireshark was updated to version 1.12.13 to fix the following issues:\n\n- CVE-2016-6504: wireshark: NDS dissector crash (bnc#991012)\n- CVE-2016-6505: wireshark: PacketBB dissector could divide\n  by zero (bnc#991013)\n- CVE-2016-6506: wireshark: WSP infinite loop (bnc#991015)\n- CVE-2016-6507: wireshark: MMSE infinite loop (bnc#991016)\n- CVE-2016-6508: wireshark: RLC long loop (bnc#991017)\n- CVE-2016-6509: wireshark: LDSS dissector crash (bnc#991018)\n- CVE-2016-6510: wireshark: RLC dissector crash (bnc#991019)\n- CVE-2016-6511: wireshark: OpenFlow long loop (bnc991020)\n      \n- CVE-2016-5350: SPOOLS infinite loop (bsc#983671).\n- CVE-2016-5351: IEEE 802.11 dissector crash (bsc#983671).\n- CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 (bsc#983671).\n- CVE-2016-5353: UMTS FP crash (bsc#983671).\n- CVE-2016-5354: USB dissector crash (bsc#983671).\n- CVE-2016-5355: Toshiba file parser crash (bsc#983671).\n- CVE-2016-5356: CoSine file parser crash (bsc#983671).\n- CVE-2016-5357: NetScreen file parser crash (bsc#983671).\n- CVE-2016-5358: Ethernet dissector crash (bsc#983671).\n- CVE-2016-5359: WBXML infinite loop (bsc#983671).\n\nFor more details please see:\n  https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html\n  https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html\n    \n","title":"Description of the patch"},{"category":"details","text":"SUSE-SLE-DESKTOP-12-SP1-2016-1429,SUSE-SLE-SDK-12-SP1-2016-1429,SUSE-SLE-SERVER-12-SP1-2016-1429","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2453-1.json"},{"category":"self","summary":"URL for SUSE-SU-2016:2453-1","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162453-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2016:2453-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html"},{"category":"self","summary":"SUSE Bug 983671","url":"https://bugzilla.suse.com/983671"},{"category":"self","summary":"SUSE Bug 991012","url":"https://bugzilla.suse.com/991012"},{"category":"self","summary":"SUSE Bug 991013","url":"https://bugzilla.suse.com/991013"},{"category":"self","summary":"SUSE Bug 991015","url":"https://bugzilla.suse.com/991015"},{"category":"self","summary":"SUSE Bug 991016","url":"https://bugzilla.suse.com/991016"},{"category":"self","summary":"SUSE Bug 991017","url":"https://bugzilla.suse.com/991017"},{"category":"self","summary":"SUSE Bug 991018","url":"https://bugzilla.suse.com/991018"},{"category":"self","summary":"SUSE Bug 991019","url":"https://bugzilla.suse.com/991019"},{"category":"self","summary":"SUSE Bug 991020","url":"https://bugzilla.suse.com/991020"},{"category":"self","summary":"SUSE CVE CVE-2016-5350 page","url":"https://www.suse.com/security/cve/CVE-2016-5350/"},{"category":"self","summary":"SUSE CVE CVE-2016-5351 page","url":"https://www.suse.com/security/cve/CVE-2016-5351/"},{"category":"self","summary":"SUSE CVE CVE-2016-5352 page","url":"https://www.suse.com/security/cve/CVE-2016-5352/"},{"category":"self","summary":"SUSE CVE CVE-2016-5353 page","url":"https://www.suse.com/security/cve/CVE-2016-5353/"},{"category":"self","summary":"SUSE CVE CVE-2016-5354 page","url":"https://www.suse.com/security/cve/CVE-2016-5354/"},{"category":"self","summary":"SUSE CVE CVE-2016-5355 page","url":"https://www.suse.com/security/cve/CVE-2016-5355/"},{"category":"self","summary":"SUSE CVE CVE-2016-5356 page","url":"https://www.suse.com/security/cve/CVE-2016-5356/"},{"category":"self","summary":"SUSE CVE CVE-2016-5357 page","url":"https://www.suse.com/security/cve/CVE-2016-5357/"},{"category":"self","summary":"SUSE CVE CVE-2016-5358 page","url":"https://www.suse.com/security/cve/CVE-2016-5358/"},{"category":"self","summary":"SUSE CVE CVE-2016-5359 page","url":"https://www.suse.com/security/cve/CVE-2016-5359/"},{"category":"self","summary":"SUSE CVE CVE-2016-6504 page","url":"https://www.suse.com/security/cve/CVE-2016-6504/"},{"category":"self","summary":"SUSE CVE CVE-2016-6505 page","url":"https://www.suse.com/security/cve/CVE-2016-6505/"},{"category":"self","summary":"SUSE CVE CVE-2016-6506 page","url":"https://www.suse.com/security/cve/CVE-2016-6506/"},{"category":"self","summary":"SUSE CVE CVE-2016-6507 page","url":"https://www.suse.com/security/cve/CVE-2016-6507/"},{"category":"self","summary":"SUSE CVE CVE-2016-6508 page","url":"https://www.suse.com/security/cve/CVE-2016-6508/"},{"category":"self","summary":"SUSE CVE CVE-2016-6509 page","url":"https://www.suse.com/security/cve/CVE-2016-6509/"},{"category":"self","summary":"SUSE CVE CVE-2016-6510 page","url":"https://www.suse.com/security/cve/CVE-2016-6510/"},{"category":"self","summary":"SUSE CVE CVE-2016-6511 page","url":"https://www.suse.com/security/cve/CVE-2016-6511/"}],"title":"Security update for wireshark","tracking":{"current_release_date":"2016-10-04T15:57:05Z","generator":{"date":"2016-10-04T15:57:05Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2016:2453-1","initial_release_date":"2016-10-04T15:57:05Z","revision_history":[{"date":"2016-10-04T15:57:05Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"wireshark-devel-1.12.13-31.1.ppc64le","product":{"name":"wireshark-devel-1.12.13-31.1.ppc64le","product_id":"wireshark-devel-1.12.13-31.1.ppc64le"}},{"category":"product_version","name":"wireshark-1.12.13-31.1.ppc64le","product":{"name":"wireshark-1.12.13-31.1.ppc64le","product_id":"wireshark-1.12.13-31.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"wireshark-devel-1.12.13-31.1.s390x","product":{"name":"wireshark-devel-1.12.13-31.1.s390x","product_id":"wireshark-devel-1.12.13-31.1.s390x"}},{"category":"product_version","name":"wireshark-1.12.13-31.1.s390x","product":{"name":"wireshark-1.12.13-31.1.s390x","product_id":"wireshark-1.12.13-31.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"wireshark-1.12.13-31.1.x86_64","product":{"name":"wireshark-1.12.13-31.1.x86_64","product_id":"wireshark-1.12.13-31.1.x86_64"}},{"category":"product_version","name":"wireshark-devel-1.12.13-31.1.x86_64","product":{"name":"wireshark-devel-1.12.13-31.1.x86_64","product_id":"wireshark-devel-1.12.13-31.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Desktop 12 SP1","product":{"name":"SUSE Linux Enterprise Desktop 12 SP1","product_id":"SUSE Linux Enterprise Desktop 12 SP1","product_identification_helper":{"cpe":"cpe:/o:suse:sled:12:sp1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Software Development Kit 12 SP1","product":{"name":"SUSE Linux Enterprise Software Development Kit 12 SP1","product_id":"SUSE Linux Enterprise Software Development Kit 12 SP1","product_identification_helper":{"cpe":"cpe:/o:suse:sle-sdk:12:sp1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 12 SP1","product":{"name":"SUSE Linux Enterprise Server 12 SP1","product_id":"SUSE Linux Enterprise Server 12 SP1","product_identification_helper":{"cpe":"cpe:/o:suse:sles:12:sp1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 12 SP1","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 12 SP1","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP1","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:12:sp1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"wireshark-1.12.13-31.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1","product_id":"SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64"},"product_reference":"wireshark-1.12.13-31.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Desktop 12 SP1"},{"category":"default_component_of","full_product_name":{"name":"wireshark-devel-1.12.13-31.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1","product_id":"SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le"},"product_reference":"wireshark-devel-1.12.13-31.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 12 SP1"},{"category":"default_component_of","full_product_name":{"name":"wireshark-devel-1.12.13-31.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1","product_id":"SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x"},"product_reference":"wireshark-devel-1.12.13-31.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 12 SP1"},{"category":"default_component_of","full_product_name":{"name":"wireshark-devel-1.12.13-31.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1","product_id":"SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"},"product_reference":"wireshark-devel-1.12.13-31.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 12 SP1"},{"category":"default_component_of","full_product_name":{"name":"wireshark-1.12.13-31.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1","product_id":"SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le"},"product_reference":"wireshark-1.12.13-31.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP1"},{"category":"default_component_of","full_product_name":{"name":"wireshark-1.12.13-31.1.s390x as component of SUSE Linux Enterprise Server 12 SP1","product_id":"SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x"},"product_reference":"wireshark-1.12.13-31.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP1"},{"category":"default_component_of","full_product_name":{"name":"wireshark-1.12.13-31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1","product_id":"SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64"},"product_reference":"wireshark-1.12.13-31.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP1"},{"category":"default_component_of","full_product_name":{"name":"wireshark-1.12.13-31.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le"},"product_reference":"wireshark-1.12.13-31.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP1"},{"category":"default_component_of","full_product_name":{"name":"wireshark-1.12.13-31.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x"},"product_reference":"wireshark-1.12.13-31.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP1"},{"category":"default_component_of","full_product_name":{"name":"wireshark-1.12.13-31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64"},"product_reference":"wireshark-1.12.13-31.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP1"}]},"vulnerabilities":[{"cve":"CVE-2016-5350","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5350"}],"notes":[{"category":"general","text":"epan/dissectors/packet-dcerpc-spoolss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5350","url":"https://www.suse.com/security/cve/CVE-2016-5350"},{"category":"external","summary":"SUSE Bug 983671 for CVE-2016-5350","url":"https://bugzilla.suse.com/983671"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"important"}],"title":"CVE-2016-5350"},{"cve":"CVE-2016-5351","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5351"}],"notes":[{"category":"general","text":"epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5351","url":"https://www.suse.com/security/cve/CVE-2016-5351"},{"category":"external","summary":"SUSE Bug 983671 for CVE-2016-5351","url":"https://bugzilla.suse.com/983671"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"important"}],"title":"CVE-2016-5351"},{"cve":"CVE-2016-5352","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5352"}],"notes":[{"category":"general","text":"epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5352","url":"https://www.suse.com/security/cve/CVE-2016-5352"},{"category":"external","summary":"SUSE Bug 983671 for CVE-2016-5352","url":"https://bugzilla.suse.com/983671"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"important"}],"title":"CVE-2016-5352"},{"cve":"CVE-2016-5353","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5353"}],"notes":[{"category":"general","text":"epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5353","url":"https://www.suse.com/security/cve/CVE-2016-5353"},{"category":"external","summary":"SUSE Bug 983671 for CVE-2016-5353","url":"https://bugzilla.suse.com/983671"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"important"}],"title":"CVE-2016-5353"},{"cve":"CVE-2016-5354","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5354"}],"notes":[{"category":"general","text":"The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5354","url":"https://www.suse.com/security/cve/CVE-2016-5354"},{"category":"external","summary":"SUSE Bug 983671 for CVE-2016-5354","url":"https://bugzilla.suse.com/983671"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"important"}],"title":"CVE-2016-5354"},{"cve":"CVE-2016-5355","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5355"}],"notes":[{"category":"general","text":"wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5355","url":"https://www.suse.com/security/cve/CVE-2016-5355"},{"category":"external","summary":"SUSE Bug 983671 for CVE-2016-5355","url":"https://bugzilla.suse.com/983671"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"important"}],"title":"CVE-2016-5355"},{"cve":"CVE-2016-5356","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5356"}],"notes":[{"category":"general","text":"wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5356","url":"https://www.suse.com/security/cve/CVE-2016-5356"},{"category":"external","summary":"SUSE Bug 983671 for CVE-2016-5356","url":"https://bugzilla.suse.com/983671"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"important"}],"title":"CVE-2016-5356"},{"cve":"CVE-2016-5357","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5357"}],"notes":[{"category":"general","text":"wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5357","url":"https://www.suse.com/security/cve/CVE-2016-5357"},{"category":"external","summary":"SUSE Bug 983671 for CVE-2016-5357","url":"https://bugzilla.suse.com/983671"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"important"}],"title":"CVE-2016-5357"},{"cve":"CVE-2016-5358","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5358"}],"notes":[{"category":"general","text":"epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5358","url":"https://www.suse.com/security/cve/CVE-2016-5358"},{"category":"external","summary":"SUSE Bug 983671 for CVE-2016-5358","url":"https://bugzilla.suse.com/983671"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"important"}],"title":"CVE-2016-5358"},{"cve":"CVE-2016-5359","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5359"}],"notes":[{"category":"general","text":"epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 1.12.x before 1.12.12 mishandles offsets, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5359","url":"https://www.suse.com/security/cve/CVE-2016-5359"},{"category":"external","summary":"SUSE Bug 983671 for CVE-2016-5359","url":"https://bugzilla.suse.com/983671"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"important"}],"title":"CVE-2016-5359"},{"cve":"CVE-2016-6504","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-6504"}],"notes":[{"category":"general","text":"epan/dissectors/packet-ncp2222.inc in the NDS dissector in Wireshark 1.12.x before 1.12.13 does not properly maintain a ptvc data structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-6504","url":"https://www.suse.com/security/cve/CVE-2016-6504"},{"category":"external","summary":"SUSE Bug 991012 for CVE-2016-6504","url":"https://bugzilla.suse.com/991012"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"moderate"}],"title":"CVE-2016-6504"},{"cve":"CVE-2016-6505","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-6505"}],"notes":[{"category":"general","text":"epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-6505","url":"https://www.suse.com/security/cve/CVE-2016-6505"},{"category":"external","summary":"SUSE Bug 991013 for CVE-2016-6505","url":"https://bugzilla.suse.com/991013"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"moderate"}],"title":"CVE-2016-6505"},{"cve":"CVE-2016-6506","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-6506"}],"notes":[{"category":"general","text":"epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-6506","url":"https://www.suse.com/security/cve/CVE-2016-6506"},{"category":"external","summary":"SUSE Bug 991015 for CVE-2016-6506","url":"https://bugzilla.suse.com/991015"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"moderate"}],"title":"CVE-2016-6506"},{"cve":"CVE-2016-6507","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-6507"}],"notes":[{"category":"general","text":"epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12.x before 1.12.13 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-6507","url":"https://www.suse.com/security/cve/CVE-2016-6507"},{"category":"external","summary":"SUSE Bug 991016 for CVE-2016-6507","url":"https://bugzilla.suse.com/991016"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"moderate"}],"title":"CVE-2016-6507"},{"cve":"CVE-2016-6508","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-6508"}],"notes":[{"category":"general","text":"epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-6508","url":"https://www.suse.com/security/cve/CVE-2016-6508"},{"category":"external","summary":"SUSE Bug 991017 for CVE-2016-6508","url":"https://bugzilla.suse.com/991017"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"moderate"}],"title":"CVE-2016-6508"},{"cve":"CVE-2016-6509","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-6509"}],"notes":[{"category":"general","text":"epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 mishandles conversations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-6509","url":"https://www.suse.com/security/cve/CVE-2016-6509"},{"category":"external","summary":"SUSE Bug 991018 for CVE-2016-6509","url":"https://bugzilla.suse.com/991018"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"moderate"}],"title":"CVE-2016-6509"},{"cve":"CVE-2016-6510","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-6510"}],"notes":[{"category":"general","text":"Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-6510","url":"https://www.suse.com/security/cve/CVE-2016-6510"},{"category":"external","summary":"SUSE Bug 991019 for CVE-2016-6510","url":"https://bugzilla.suse.com/991019"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"moderate"}],"title":"CVE-2016-6510"},{"cve":"CVE-2016-6511","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-6511"}],"notes":[{"category":"general","text":"epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (OpenFlow dissector large loop) via a crafted packet.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-6511","url":"https://www.suse.com/security/cve/CVE-2016-6511"},{"category":"external","summary":"SUSE Bug 991020 for CVE-2016-6511","url":"https://bugzilla.suse.com/991020"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP1:wireshark-1.12.13-31.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP1:wireshark-devel-1.12.13-31.1.x86_64"]}],"threats":[{"category":"impact","date":"2016-10-04T15:57:05Z","details":"moderate"}],"title":"CVE-2016-6511"}]}