[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues
From:       Kurt Seifried <kurt () seifried ! org>
Date:       2011-05-31 23:54:16
Message-ID: BANLkTi=rVaiWh_oBXiB8ZLks441+-ynuAw () mail ! gmail ! com
[Download RAW message or body]

I didn't see any CVE's in the Wireshark Bug tracking/advisory nor
could I find these in the Red Hat Bugzilla (but I'm guessing as a CNA
they have CVE #'s assigned?)

Wireshark 1.2.17 fixes the following vulnerabilities:

Large/infinite loop in the DICOM dissector. (Bug 5876)
Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered
that a corrupted Diameter dictionary file could crash Wireshark.
Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered
that a corrupted snoop file could crash Wireshark. (Bug 5912)
Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

David Maciejak of Fortinet's FortiGuard Labs discovered that malformed
compressed capture data could crash Wireshark. (Bug 5908)
Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered
that a corrupted Visual Networks file could crash Wireshark. (Bug
5934)
Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.


http://www.wireshark.org/security/wnpa-sec-2011-07.html
http://www.wireshark.org/security/wnpa-sec-2011-08.html

-- 
Kurt Seifried
kurt@seifried.org
skype: (206) 905-9462
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic