Summary: | <net-analyzer/wireshark-1.2.9 multiple vulnerabilities (CVE-2010-2283) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Matthias Geerdsen (RETIRED) <vorlon> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | netmon |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.wireshark.org/security/wnpa-sec-2010-06.html | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Matthias Geerdsen (RETIRED)
2010-06-13 21:10:21 UTC
rerating to B1, since the advisory has the following section, although secunia only mention DoS: Impact It may be possible to make Wireshark crash, hang, or execute code by injecting a series of malformed packets onto the wire or by convincing someone to read a malformed packet trace file. wireshark-1.2.9 is already in the tree since 11 Jun 2010. arch teams, please, go ahead. x86 stable alpha/ia64/sparc stable hppa stable amd64 stable CVE-2010-2283 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2283): The SMB dissector in Wireshark 0.99.6 through 1.0.13, and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (NULL pointer dereference) via unknown vectors. ppc64 done Stable for PPC. GLSA with bugs 330479 and 339401. This issue was resolved and addressed in GLSA 201110-02 at http://security.gentoo.org/glsa/glsa-201110-02.xml by GLSA coordinator Alex Legler (a3li). This issue was resolved and addressed in GLSA 201110-02 at http://security.gentoo.org/glsa/glsa-201110-02.xml by GLSA coordinator Alex Legler (a3li). |