Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=7ec20971622c947b0bc8830ff68b22398afb2e93
commit 7ec20971622c947b0bc8830ff68b22398afb2e93 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Jan 15 15:45:40 2008 +0100 FSA337-wireshark diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index b19a564..80794e0 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,37 @@ <fsas> <fsa> + <id>337</id> + <date>2008-01-15</date> + <author>vmiklos</author> + <package>wireshark</package> + <vulnerable>0.99.6-4</vulnerable> + <unaffected>0.99.7-1terminus1</unaffected> + <bts>http://bugs.frugalware.org/task/2605</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451</cve> + <desc>Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). + The vulnerabilities are caused due to various errors (e.g. large loops with extreme memory consumption, endless loops, crashes, and buffer overflows) within the following: + * SSL, ANSI MAP, Firebird/Interbase, NCP, HTTP, MEGACO, DCP ETSI, PPP, Bluetooth SDP, SMB, USB, WiMAX, RPL, and CIP dissectors + * when processing a malformed MP3 or iSeries (OS/400) Communication trace file + * when processing a malformed DNP or RPC Portmap packet + These can be exploited to crash Wireshark or consume large amounts of system resources by e.g. parsing a specially crafted packet that is either captured off the wire or loaded via a capture file.</desc> + </fsa> + <fsa> <id>336</id> <date>2008-01-15</date> <author>vmiklos</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
