notfound 617200 wireshark/1.4.4-1 fixed 617200 wireshark/1.4.4-1 fixed 617200 wireshark/1.2.11-6squeeze1 thanks
Hi, 1.4.4-1 is fixed already. Cheers, Balint 2011/3/7 Mahyuddin Susanto <[email protected]>: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > Package: wireshark > Tags: security > Version: 1.4.4-1 1.4.3-3 1.2.11-6 > > Dear wireshark maintainer, a new Vulnerabilities and Exposures has > identified as CVE-2011-1140 > > URL: - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1140 > - http://security-tracker.debian.org/tracker/CVE-2011-0713 > Patch: http://anonsvn.wireshark.org/viewvc?view=rev&revision=36029 > Description: Heap-based buffer overflow in wiretap/dct3trace.c in > Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote > attackers to cause a denial of service (application crash) or possibly > have unspecified other impact via a long record in a Nokia DCT3 trace file. > > Cheers, > - -- > [ Mahyuddin Susanto ] > http://tripledin.wordpress.com/ > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.10 (GNU/Linux) > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ > > iF4EAREIAAYFAk10dtkACgkQdr7GbwjmqKUuYQEAsDpZZNy8NDDURGWfmPphTi/U > 6S3B543guDqT18OFnnkBANSLQaW9o9g52rXFucbQMwsx8LoHycFlCtQ3FOGRk6Uv > =jUl+ > -----END PGP SIGNATURE----- > > > -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

