On Thu, Aug 24, 2006 at 10:20:49PM +0100, Sam Morris wrote: > Wireshark 0.99.3 fixes the following vulnerabilities:
For those backporting fixes for these holes, I've dug up the Subversion revision numbers (I'll be doing a backport NMU for this instead of NMUing with a new upstream version, simply because the amount of work/pain needed for a new-version-NMU with a debian/ directory in there is just too big). > * The SCSI dissector could crash. > Versions affected: 0.99.2. CVE: CVE-2006-4330 svn diff -r18831:18832 http://anonsvn.wireshark.org/wireshark/trunk/ > * If Wireshark was compiled with ESP decryption support, the IPsec > ESP preference parser was susceptible to off-by-one errors. Versions > affected: 0.99.2. CVE: CVE-2006-4331 svn diff -r18855:18856 http://anonsvn.wireshark.org/wireshark/trunk/ # this also contains unrelated changes, unfortunately svn diff -r18914:18915 http://anonsvn.wireshark.org/wireshark/trunk/ svn diff -r18942:18943 http://anonsvn.wireshark.org/wireshark/trunk/ > * The DHCP dissector (and possibly others) in the Windows version of > Wireshark could trigger a bug in Glib and crash. > Versions affected: 0.10.13 - 0.99.2. CVE: CVE-2006-4332 (r18883, but not relevant for us) > * If the SSCOP dissector has a port range configured and the SSCOP > payload protocol is Q.2931, a malformed packet could make the Q.2931 > dissector use up available memory. No port range is configured by > default. Versions affected: 0.7.9 - 0.99.2. CVE: CVE-2006-4333 svn diff -r18991:18992 http://anonsvn.wireshark.org/wireshark/trunk/ /* Steinar */ -- Homepage: http://www.sesse.net/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]