Darcsweb-Url: http://darcs.frugalware.org/darcsweb/darcsweb.cgi?r=homepage-ng;a=darcs_commitdiff;h=20061105201200-dd049-1ad173109c7060eff1368d4b38762bbb3ccbf1bd.gz;
[FSA35-wireshark voroskoi <[EMAIL PROTECTED]>**20061105201200] { hunk ./frugalware/xml/security.xml 29 + <fsa> + <id>35</id> + <date>2006-11-05</date> + <author>voroskoi</author> + <package>wireshark</package> + <vulnerable>0.99.3a-1</vulnerable> + <unaffected>0.99.4-1siwenna1</unaffected> + <bts>http://bugs.frugalware.org/task/1376</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5468 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5740 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4805 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5469 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5595</cve> + <desc>Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). + Errors within the HTTP, LDAP, XOT, WBXML, and MIME parsers can be exploited to cause a crash or consume large amounts of memory when parsing a specially crafted packet that is either captured off the wire or loaded via a capture file.</desc> + </fsa> } _______________________________________________ Frugalware-darcs mailing list Frugalware-darcs@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-darcs