Package: ethereal Version: 0.10.10-2sarge4 Severity: grave Tags: security Justification: dos attack
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - From <http://www.wireshark.org/security/wnpa-sec-2006-02.html>: If the SSCOP dissector has a port range configured and the SSCOP payload protocol is Q.2931, a malformed packet could make the Q.2931 dissector use up available memory. No port range is configured by default. Versions affected: 0.7.9 - 0.99.2. CVE: CVE-2006-4333 The other vulnerabilities listen on that page do not apply to the version of Ethereal in Sarge. - -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (530, 'testing'), (520, 'unstable'), (510, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.17-2-k7 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFE7hmhshl/216gEHgRAsZpAJ0aznD9P/pC9dQvQUm91tfJzgiEEgCgkDeh pM3EifITi+hr/85YhkM0mZU= =PpHk -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]