Summary: | <net-analyzer/wireshark-1.4.8: Lucent/Ascend file parser vulnerability (CVE-2011-2597) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | netmon, pva |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.wireshark.org/security/wnpa-sec-2011-10.html | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
![]() CVE-2011-2597 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2597): The Lucent/Ascend file parser in Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7, and 1.6.0 allows remote attackers to cause a denial of service (infinite loop) via malformed packets. Thank you Tim. Should be fixed in 1.4.8: http://www.wireshark.org/security/wnpa-sec-2011-10.html Arch teams, please, stabilize wireshark-1.4.8. amd64: emerge pass, launch pass. x86 stable x86 done. Thanks ppc/ppc64 done amd64 done. Thanks Elijah Stable for HPPA. alpha/ia64/sparc stable Thanks, Peter, folks. GLSA Vote: no. This issue was resolved and addressed in GLSA 201110-02 at http://security.gentoo.org/glsa/glsa-201110-02.xml by GLSA coordinator Alex Legler (a3li). This issue was resolved and addressed in GLSA 201110-02 at http://security.gentoo.org/glsa/glsa-201110-02.xml by GLSA coordinator Alex Legler (a3li). |