[Secure-testing-team] Bug#553583: CVE-2009-3829 CVE-2009-3551 CVE-2009-3550 CVE-2009-3549
Giuseppe Iuculano
iuculano at debian.org
Sun Nov 1 09:37:56 UTC 2009
Package: wireshark
Severity: grave
Tags: security
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for wireshark.
CVE-2009-3829[0]:
| Integer overflow in wiretap/erf.c in Wireshark before 1.2.2 allows
| remote attackers to execute arbitrary code or cause a denial of
| service (application crash) via a crafted erf file, related to an
| "unsigned integer wrap vulnerability."
CVE-2009-3551[1]:
| Off-by-one error in the dissect_negprot_response function in
| packet-smb.c in the SMB dissector in Wireshark 1.2.0 through 1.2.2
| allows remote attackers to cause a denial of service (application
| crash) via a file that records a malformed packet trace. NOTE: some of
| these details are obtained from third party information.
CVE-2009-3550[2]:
| The DCERPC/NT dissector in Wireshark 0.10.10 through 1.0.9 and 1.2.0
| through 1.2.2 allows remote attackers to cause a denial of service
| (NULL pointer dereference and application crash) via a file that
| records a malformed packet trace. NOTE: some of these details are
| obtained from third party information.
CVE-2009-3549[3]:
| packet-paltalk.c in the Paltalk dissector in Wireshark 1.2.0 through
| 1.2.2, on SPARC and certain other platforms, allows remote attackers
| to cause a denial of service (application crash) via a file that
| records a malformed packet trace.
If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829
http://security-tracker.debian.org/tracker/CVE-2009-3829
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551
http://security-tracker.debian.org/tracker/CVE-2009-3551
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550
http://security-tracker.debian.org/tracker/CVE-2009-3550
[3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549
http://security-tracker.debian.org/tracker/CVE-2009-3549
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkrtVvEACgkQNxpp46476aoiqwCdGWJG9CgxX9BIUSznE/lrJrnV
4vgAnjnZneMmcrMm15whTlW4aeHfaU8S
=eSSm
-----END PGP SIGNATURE-----
More information about the Secure-testing-team
mailing list