[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE Request -- wireshark
From:       Pinar Yanardag <pinar () pardus ! org ! tr>
Date:       2008-11-25 8:44:49
Message-ID: 492BBB01.1010200 () pardus ! org ! tr
[Download RAW message or body]

On 11/24/2008 11:46 AM Jan Lieskovsky wrote:
> Hello Steve,
> 
> the following remotely exploitable vulnerability in Wireshark's
> SMTP dissector has been reported:
> 
> References:
> http://packetstormsecurity.org/0811-advisories/wireshark104-dos.txt
> http://bugs.gentoo.org/show_bug.cgi?id=248425
> https://bugzilla.redhat.com/show_bug.cgi?id=472737
> http://www.nabble.com/-SVRT-04-08--Vulnerability-in-WireShark-1.0.4-for-DoS-Attack-td20640164.html
>  http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2008-11/msg00166.html
> 
> Proposed upstream patches:
> http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-smtp.c?r1=24989&r2=24988&pathrev=24989&view=patch
>  http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-smtp.c?r1=24994&r2=24993&pathrev=24994&view=patch
>  

They also updated the fix in the prerelease [1] Wireshark 1.0.5 [2].

[1]: http://www.wireshark.org/download/prerelease
[2]: 
http://www.wireshark.org/download/prerelease/wireshark-1.0.5pre1-26829.tar.gz

Cheers,

-- 
Pinar Yanardag (a.k.a PINguAR)
http://pinguar.org
_____________________________

Pardus Security Team
http://security.pardus.org.tr


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic