notfound 617200 wireshark/1.4.4-1
fixed 617200 wireshark/1.4.4-1
fixed 617200 wireshark/1.2.11-6squeeze1
thanks

Hi,

1.4.4-1 is fixed already.

Cheers,
Balint

2011/3/7 Mahyuddin Susanto <[email protected]>:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Package: wireshark
> Tags: security
> Version: 1.4.4-1 1.4.3-3 1.2.11-6
>
> Dear wireshark maintainer, a new Vulnerabilities and Exposures has
> identified as CVE-2011-1140
>
> URL: - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1140
>     - http://security-tracker.debian.org/tracker/CVE-2011-0713
> Patch: http://anonsvn.wireshark.org/viewvc?view=rev&revision=36029
> Description: Heap-based buffer overflow in wiretap/dct3trace.c in
> Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote
> attackers to cause a denial of service (application crash) or possibly
> have unspecified other impact via a long record in a Nokia DCT3 trace file.
>
> Cheers,
> - --
> [ Mahyuddin Susanto ]
> http://tripledin.wordpress.com/
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>
> iF4EAREIAAYFAk10dtkACgkQdr7GbwjmqKUuYQEAsDpZZNy8NDDURGWfmPphTi/U
> 6S3B543guDqT18OFnnkBANSLQaW9o9g52rXFucbQMwsx8LoHycFlCtQ3FOGRk6Uv
> =jUl+
> -----END PGP SIGNATURE-----
>
>
>



--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to