Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=3f9034d74b0e04a8032dbbf518c9bc2f5b8879a4

commit 3f9034d74b0e04a8032dbbf518c9bc2f5b8879a4
Author: Miklos Vajna <[email protected]>
Date:   Mon Mar 1 21:05:06 2010 +0100

FSA636-wireshark

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 25b0da1..1c72fa6 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,21 @@

<fsas>
<fsa>
+               <id>636</id>
+               <date>2010-03-01</date>
+               <author>Miklos Vajna</author>
+               <package>wireshark</package>
+               <vulnerable>1.2.5-1getorin1</vulnerable>
+               <unaffected>1.2.6-1getorin1</unaffected>
+               <bts>http://bugs.frugalware.org/task/4087</bts>
+               <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0304</cve>
+               <desc>Some vulnerabilities have been reported in Wireshark, 
which can be exploited by malicious people to cause a DoS (Denial of Service) 
or compromise a user's system.
+The vulnerabilities are caused due to errors within the LWRES dissector, which 
can be exploited to cause e.g. a stack-based buffer overflow via a specially 
crafted network packet or by tricking a user into loading a specially crafted 
capture file.
+Successful exploitation allows execution of arbitrary code.</desc>
+       </fsa>
+       <fsa>
<id>635</id>
<date>2010-03-01</date>
<author>Miklos Vajna</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to