Package: wireshark
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for wireshark.

CVE-2008-4685[0]:
| Use-after-free vulnerability in the dissect_q931_cause_ie function in
| packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3
| allows remote attackers to cause a denial of service (application
| crash or abort) via certain packets that trigger an exception.

CVE-2008-4684[1]:
| packet-frame in Wireshark 0.99.2 through 1.0.3 does not properly
| handle exceptions thrown by post dissectors, which allows remote
| attackers to cause a denial of service (application crash) via a
| certain series of packets, as demonstrated by enabling the (1) PRP or
| (2) MATE post dissector.

CVE-2008-4683[2]:
| The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL
| dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to
| cause a denial of service (application crash or abort) via a packet
| with an invalid length, related to an erroneous tvb_memcpy call.

CVE-2008-4682[3]:
| wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote attackers to
| cause a denial of service (application abort) via a malformed Tamos
| CommView capture file (aka .ncf file) with an "unknown/unexpected
| packet type" that triggers a failed assertion.

CVE-2008-4681[4]:
| Unspecified vulnerability in the Bluetooth RFCOMM dissector in
| Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a
| denial of service (application crash or abort) via unknown packets.

CVE-2008-4680[5]:
| packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3
| allows remote attackers to cause a denial of service (application
| crash or abort) via a malformed USB Request Block (URB).

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685
    http://security-tracker.debian.net/tracker/CVE-2008-4685
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684
    http://security-tracker.debian.net/tracker/CVE-2008-4684
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683
    http://security-tracker.debian.net/tracker/CVE-2008-4683
[3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682
    http://security-tracker.debian.net/tracker/CVE-2008-4682
[4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681
    http://security-tracker.debian.net/tracker/CVE-2008-4681
[5] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680
    http://security-tracker.debian.net/tracker/CVE-2008-4680

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpbeUSnDzQct.pgp
Description: PGP signature

Reply via email to