Package: wireshark Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for wireshark.
CVE-2008-4685[0]: | Use-after-free vulnerability in the dissect_q931_cause_ie function in | packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3 | allows remote attackers to cause a denial of service (application | crash or abort) via certain packets that trigger an exception. CVE-2008-4684[1]: | packet-frame in Wireshark 0.99.2 through 1.0.3 does not properly | handle exceptions thrown by post dissectors, which allows remote | attackers to cause a denial of service (application crash) via a | certain series of packets, as demonstrated by enabling the (1) PRP or | (2) MATE post dissector. CVE-2008-4683[2]: | The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL | dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to | cause a denial of service (application crash or abort) via a packet | with an invalid length, related to an erroneous tvb_memcpy call. CVE-2008-4682[3]: | wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote attackers to | cause a denial of service (application abort) via a malformed Tamos | CommView capture file (aka .ncf file) with an "unknown/unexpected | packet type" that triggers a failed assertion. CVE-2008-4681[4]: | Unspecified vulnerability in the Bluetooth RFCOMM dissector in | Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a | denial of service (application crash or abort) via unknown packets. CVE-2008-4680[5]: | packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 | allows remote attackers to cause a denial of service (application | crash or abort) via a malformed USB Request Block (URB). If you fix the vulnerabilities please also make sure to include the CVE ids in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685 http://security-tracker.debian.net/tracker/CVE-2008-4685 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684 http://security-tracker.debian.net/tracker/CVE-2008-4684 [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683 http://security-tracker.debian.net/tracker/CVE-2008-4683 [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682 http://security-tracker.debian.net/tracker/CVE-2008-4682 [4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681 http://security-tracker.debian.net/tracker/CVE-2008-4681 [5] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680 http://security-tracker.debian.net/tracker/CVE-2008-4680 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpbeUSnDzQct.pgp
Description: PGP signature