Summary: | <net-analyzer/wireshark-{1.0.10, 1.2.3}: DoS (CVE-2009-{2560,3549,3550,3551}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Legler (RETIRED) <a3li> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | netmon, pva |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.wireshark.org/news/20091027.html | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Alex Legler (RETIRED)
![]() ![]() ![]() This is now public via the following advisories: wnpa-sec-2009-07: Multiple vulnerabilities in Wireshark® version 0.10.10 to 1.2.2 http://www.wireshark.org/security/wnpa-sec-2009-07.html wnpa-sec-2009-08: Multiple vulnerabilities in Wireshark® version 0.10.10 to 1.0.9 http://www.wireshark.org/security/wnpa-sec-2009-08.html Peter/Netmon, please bump. bumped. Arch teams, please, stabilize wireshark-1.2.3. x86 stable + 29 Oct 2009; <chainsaw@gentoo.org> wireshark-1.2.3.ebuild: + Marked stable on AMD64 as requested by Alex "a3li" Legler in security bug + #290710. Tested capture on a Marvell "sky2" 88E8055 Gig-copper NIC. Stable for HPPA. alpha/ia64/sparc stable ppc64 done CVE-2009-3549 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3549): packet-paltalk.c in the Paltalk dissector in Wireshark 1.2.0 through 1.2.2, on SPARC and certain other platforms, allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace. CVE-2009-3550 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3550): The DCERPC/NT dissector in Wireshark 0.10.10 through 1.0.9 and 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a file that records a malformed packet trace. NOTE: some of these details are obtained from third party information. CVE-2009-3551 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3551): Off-by-one error in the dissect_negprot_response function in packet-smb.c in the SMB dissector in Wireshark 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace. NOTE: some of these details are obtained from third party information. ppc stable GLSA together with bug 285280. GLSA 200911-05 |