Summary: | <net-analyzer/wireshark-1.2.6: LWRES vulnerability (CVE-2010-0304) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Peter Volkov (RETIRED) <pva> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Peter Volkov (RETIRED)
![]() And new version is in the tree. Arch teams, please, stabilize. ppc64 done ppc done Stable for HPPA. alpha/ia64/sparc/x86 stable amd64 done too. CVE-2010-0304 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0304): Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function. Sounds like an app crash to me. GLSA vote: NO. Closing noglsa. |