wireshark (0.99.4-6ubuntu0.1) feisty-security; urgency=low * SECURITY UPDATE: wireshark has several vulnerabilities: (LP: #132915) + CVE-2007-3389: Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload. + CVE-2007-3390: Wireshark 0.99.5 and 0.10.x up to 0.10.14, when running on certain systems, allows remote attackers to cause a denial of service (crash) via crafted iSeries capture files that trigger a SIGTRAP. + CVE-2007-3392: Wireshark before 0.99.6 allows remote attackers to cause a denial of service via malformed (1) SSL or (2) MMS packets that trigger an infinite loop. + CVE-2007-3393: Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets. + CVE-2007-4721: Integer signedness error in the DNP3 dissector in Wireshark 0.99.5 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain DNP3 packet. * debian/patches/12_secu_0.99.6_r21034.dpatch: - applied patch from upstream (Link: http://anonsvn.wireshark.org/viewvc/viewvc.py/trunk/epan/dissectors/packet-http.c?view=log&pathrev=21034) * debian/patches/12_secu_0.99.6_r20990.dpatch: - applied patch from upstream (Link: http://anonsvn.wireshark.org/viewvc/viewvc.py/trunk/wiretap/iseries.c?r1=19814&r2=20990&pathrev=20990) * debian/patches/12_secu_0.99.6_r21392.dpatch , 12_secu_0.99.6_r21665.dpatch: - applied patches from upstream (Link: http://anonsvn.wireshark.org/viewvc/viewvc.py/trunk/epan/dissectors/packet-ssl.c?r1=21650&r2=21665&pathrev=21665&view=patch) (Link: http://anonsvn.wireshark.org/viewvc/viewvc.py/trunk/epan/dissectors/packet-mms.c?r1=21088&r2=21392&pathrev=21392&view=patch) * debian/patches/12_secu_0.99.6_r21947.dpatch: - applied patch from upstream (Link: http://anonsvn.wireshark.org/viewvc/viewvc.py/trunk/epan/dissectors/packet-bootp.c?r1=21924&r2=21947&pathrev=21947&view=patch) * debian/patches/13_CVE-2007-4721.dpatch: - Applied patch according to the explanation on bugtraq. (Link: http://archives.neohapsis.com/archives/bugtraq/2007-09/0030.html) * References: CVE-2007-3389 http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394 CVE-2007-3390 http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1415 CVE-2007-3392 http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1342 http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1582 CVE-2007-3393 http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1416 CVE-2007-4721 http://archives.neohapsis.com/archives/bugtraq/2007-09/0030.html
-- Stephan Hermann <[EMAIL PROTECTED]> Thu, 15 Nov 2007 20:45:17 +0100 ** Changed in: wireshark (Ubuntu Feisty) Status: Fix Committed => Fix Released -- WireShark versions prior to 0.99.6 vulnerability https://bugs.launchpad.net/bugs/132915 You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs