On Thu, Aug 24, 2006 at 10:20:49PM +0100, Sam Morris wrote:
> Wireshark 0.99.3 fixes the following vulnerabilities:

For those backporting fixes for these holes, I've dug up the Subversion
revision numbers (I'll be doing a backport NMU for this instead of NMUing
with a new upstream version, simply because the amount of work/pain needed
for a new-version-NMU with a debian/ directory in there is just too big).

>     * The SCSI dissector could crash.
>         Versions affected: 0.99.2. CVE: CVE-2006-4330

svn diff -r18831:18832 http://anonsvn.wireshark.org/wireshark/trunk/

>     * If Wireshark was compiled with ESP decryption support, the IPsec
>         ESP preference parser was susceptible to off-by-one errors. Versions
>         affected: 0.99.2. CVE: CVE-2006-4331

svn diff -r18855:18856 http://anonsvn.wireshark.org/wireshark/trunk/  # this 
also contains unrelated changes, unfortunately
svn diff -r18914:18915 http://anonsvn.wireshark.org/wireshark/trunk/
svn diff -r18942:18943 http://anonsvn.wireshark.org/wireshark/trunk/

>     * The DHCP dissector (and possibly others) in the Windows version of
>         Wireshark could trigger a bug in Glib and crash.
>         Versions affected: 0.10.13 - 0.99.2. CVE: CVE-2006-4332

(r18883, but not relevant for us)

>     * If the SSCOP dissector has a port range configured and the SSCOP
>         payload protocol is Q.2931, a malformed packet could make the Q.2931
>         dissector use up available memory. No port range is configured by
>         default. Versions affected: 0.7.9 - 0.99.2. CVE: CVE-2006-4333 

svn diff -r18991:18992 http://anonsvn.wireshark.org/wireshark/trunk/

/* Steinar */
-- 
Homepage: http://www.sesse.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to