Your message dated Fri, 14 Nov 2008 23:32:10 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#503589: fixed in wireshark 1.0.2-3+lenny2 has caused the Debian Bug report #503589, regarding wireshark: CVE-2008-46[80-85] multiple security issues to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 503589: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503589 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems
--- Begin Message ---Package: wireshark Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for wireshark. CVE-2008-4685[0]: | Use-after-free vulnerability in the dissect_q931_cause_ie function in | packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3 | allows remote attackers to cause a denial of service (application | crash or abort) via certain packets that trigger an exception. CVE-2008-4684[1]: | packet-frame in Wireshark 0.99.2 through 1.0.3 does not properly | handle exceptions thrown by post dissectors, which allows remote | attackers to cause a denial of service (application crash) via a | certain series of packets, as demonstrated by enabling the (1) PRP or | (2) MATE post dissector. CVE-2008-4683[2]: | The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL | dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to | cause a denial of service (application crash or abort) via a packet | with an invalid length, related to an erroneous tvb_memcpy call. CVE-2008-4682[3]: | wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote attackers to | cause a denial of service (application abort) via a malformed Tamos | CommView capture file (aka .ncf file) with an "unknown/unexpected | packet type" that triggers a failed assertion. CVE-2008-4681[4]: | Unspecified vulnerability in the Bluetooth RFCOMM dissector in | Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a | denial of service (application crash or abort) via unknown packets. CVE-2008-4680[5]: | packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 | allows remote attackers to cause a denial of service (application | crash or abort) via a malformed USB Request Block (URB). If you fix the vulnerabilities please also make sure to include the CVE ids in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685 http://security-tracker.debian.net/tracker/CVE-2008-4685 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684 http://security-tracker.debian.net/tracker/CVE-2008-4684 [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683 http://security-tracker.debian.net/tracker/CVE-2008-4683 [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682 http://security-tracker.debian.net/tracker/CVE-2008-4682 [4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681 http://security-tracker.debian.net/tracker/CVE-2008-4681 [5] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680 http://security-tracker.debian.net/tracker/CVE-2008-4680 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.pgpaPKGyo4yQB.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: wireshark Source-Version: 1.0.2-3+lenny2 We believe that the bug you reported is fixed in the latest version of wireshark, which is due to be installed in the Debian FTP archive: tshark_1.0.2-3+lenny2_i386.deb to pool/main/w/wireshark/tshark_1.0.2-3+lenny2_i386.deb wireshark-common_1.0.2-3+lenny2_i386.deb to pool/main/w/wireshark/wireshark-common_1.0.2-3+lenny2_i386.deb wireshark-dev_1.0.2-3+lenny2_i386.deb to pool/main/w/wireshark/wireshark-dev_1.0.2-3+lenny2_i386.deb wireshark_1.0.2-3+lenny2.diff.gz to pool/main/w/wireshark/wireshark_1.0.2-3+lenny2.diff.gz wireshark_1.0.2-3+lenny2.dsc to pool/main/w/wireshark/wireshark_1.0.2-3+lenny2.dsc wireshark_1.0.2-3+lenny2_i386.deb to pool/main/w/wireshark/wireshark_1.0.2-3+lenny2_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Moritz Muehlenhoff <[EMAIL PROTECTED]> (supplier of updated wireshark package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Thu, 13 Nov 2008 23:13:27 +0100 Source: wireshark Binary: wireshark-common wireshark tshark wireshark-dev Architecture: source i386 Version: 1.0.2-3+lenny2 Distribution: testing-proposed-updates Urgency: high Maintainer: Frederic Peters <[EMAIL PROTECTED]> Changed-By: Moritz Muehlenhoff <[EMAIL PROTECTED]> Description: tshark - network traffic analyzer (console) wireshark - network traffic analyzer wireshark-common - network traffic analyser (common files) wireshark-dev - network traffic analyser (development tools) Closes: 503589 Changes: wireshark (1.0.2-3+lenny2) testing-proposed-updates; urgency=high . * Fix CVE-2008-4680 to CVE-2008-4685 (Closes: #503589) Checksums-Sha1: e4f4f3d5cd697744220ca20a543fb56c54d957c4 1490 wireshark_1.0.2-3+lenny2.dsc 50d08d2a2bec3ceb3c26bcd591d7a5be14546375 95282 wireshark_1.0.2-3+lenny2.diff.gz 1cc1604e1199dc429b0c70274256cef92cf6ce78 10117044 wireshark-common_1.0.2-3+lenny2_i386.deb ac6434d81c87e036fe6deae228c7856bb486ca94 619002 wireshark_1.0.2-3+lenny2_i386.deb 3e66e841860bdf173dea380df348b4d1451fe99c 111394 tshark_1.0.2-3+lenny2_i386.deb b941529758de5a45c08384515630f1b5488e7cd1 569610 wireshark-dev_1.0.2-3+lenny2_i386.deb Checksums-Sha256: d568d806afa3e4d485943e3a6a9a0fe386a4e9ff9fbb68746674b99ee118e8a2 1490 wireshark_1.0.2-3+lenny2.dsc 850950e6ec4bd1640bd0e829e1e173227400149d3a6add634807e6376169c700 95282 wireshark_1.0.2-3+lenny2.diff.gz d230fa65c14b55f8142629cc06c6987e8763ff12c413891ea754ac4853940f9a 10117044 wireshark-common_1.0.2-3+lenny2_i386.deb 20e9b36b8c303c0e7a86349b830a5849d651802fe4d2a4483af8574f496d1014 619002 wireshark_1.0.2-3+lenny2_i386.deb d77d5e8a59ca8089a8e0fe377949238f91f3d5ba807c6575b952ebec67de9097 111394 tshark_1.0.2-3+lenny2_i386.deb 21cd068286ca793318514c7f063c6139d24e89751f3e5c36148d8d1c5fc29f2e 569610 wireshark-dev_1.0.2-3+lenny2_i386.deb Files: 332d415ce98ed23bd5ee01e6035f63e8 1490 net optional wireshark_1.0.2-3+lenny2.dsc d6df0cee11bdb96769ead9b61626ee11 95282 net optional wireshark_1.0.2-3+lenny2.diff.gz 6d3400408c195f67d3c9c7579f03332f 10117044 net optional wireshark-common_1.0.2-3+lenny2_i386.deb d9cde8dbf8c29382ba8bde245cb104f7 619002 net optional wireshark_1.0.2-3+lenny2_i386.deb 351940b302188fb6f47eae5de276c0fb 111394 net optional tshark_1.0.2-3+lenny2_i386.deb f4d4f413fecadf928c928536312dd929 569610 devel optional wireshark-dev_1.0.2-3+lenny2_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFJHfR9Xm3vHE4uyloRAj24AJ46IZoDR5rV3kaVMCA+0egh0sZHKACfXaVu uKOFOQNCffdG4PE8+QIq/n4= =9zbx -----END PGP SIGNATURE-----
--- End Message ---