[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] [ MDVSA-2009:292 ] wireshark
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] [ MDVSA-2009:292 ] wireshark
- From: security@xxxxxxxxxxxx
- Date: Tue, 03 Nov 2009 17:16:01 +0100
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:292
http://www.mandriva.com/security/
_______________________________________________________________________
Package : wireshark
Date : November 3, 2009
Affected: 2009.1, Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Vulnerabilities have been discovered and corrected in wireshark,
affecting DCERPC/NT dissector, which allows remote attackers to cause
a denial of service (NULL pointer dereference and application crash)
via a file that records a malformed packet trace (CVE-2009-3550); and
in wiretap/erf.c which allows remote attackers to execute arbitrary
code or cause a denial of service (application crash) via a crafted
erf file (CVE-2009-3829).
The wireshark package has been updated to fix these vulnerabilities.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2009.1:
9776a5ff48251ff4014a284803f8eedb
2009.1/i586/dumpcap-1.0.10-0.1mdv2009.1.i586.rpm
5763243f9b6de3e0eb998683eb157e37
2009.1/i586/libwireshark0-1.0.10-0.1mdv2009.1.i586.rpm
615c1f912fcae0f63c14046c7292305e
2009.1/i586/libwireshark-devel-1.0.10-0.1mdv2009.1.i586.rpm
fc8c67f248b0039c0006220456f7d0dc
2009.1/i586/rawshark-1.0.10-0.1mdv2009.1.i586.rpm
be03c1c1e06412b5603dc65f1632b18a
2009.1/i586/tshark-1.0.10-0.1mdv2009.1.i586.rpm
4da9966e690a238eecbe215bfce9fe8a
2009.1/i586/wireshark-1.0.10-0.1mdv2009.1.i586.rpm
5ce93f8c9af2127d3255a87c0ea8503b
2009.1/i586/wireshark-tools-1.0.10-0.1mdv2009.1.i586.rpm
d705f70a10051311f0ccfc14e5a587af
2009.1/SRPMS/wireshark-1.0.10-0.1mdv2009.1.src.rpm
Mandriva Linux 2009.1/X86_64:
ab53926e26b33237cd48aedacd0f6260
2009.1/x86_64/dumpcap-1.0.10-0.1mdv2009.1.x86_64.rpm
4d167d0401af7c55904fd0e4bf4d5a09
2009.1/x86_64/lib64wireshark0-1.0.10-0.1mdv2009.1.x86_64.rpm
38c8c81a64a488965f397ac55aca4f0d
2009.1/x86_64/lib64wireshark-devel-1.0.10-0.1mdv2009.1.x86_64.rpm
0dd651556a433aae58a1d3311dbeacf4
2009.1/x86_64/rawshark-1.0.10-0.1mdv2009.1.x86_64.rpm
4e3b3d843fc38637fb5fcb505516a444
2009.1/x86_64/tshark-1.0.10-0.1mdv2009.1.x86_64.rpm
f5d7864ae57e97d98abfd1d0da2c601b
2009.1/x86_64/wireshark-1.0.10-0.1mdv2009.1.x86_64.rpm
e241a5747541de4b35cb884a3a2a2e09
2009.1/x86_64/wireshark-tools-1.0.10-0.1mdv2009.1.x86_64.rpm
d705f70a10051311f0ccfc14e5a587af
2009.1/SRPMS/wireshark-1.0.10-0.1mdv2009.1.src.rpm
Corporate 4.0:
00f7f312ecb50337a61e8aa226351f0f
corporate/4.0/i586/dumpcap-1.0.10-0.1.20060mlcs4.i586.rpm
397831075a172aa09914b851978764c0
corporate/4.0/i586/libwireshark0-1.0.10-0.1.20060mlcs4.i586.rpm
38c43d3e4c53be9afdf63e25f81022cd
corporate/4.0/i586/libwireshark-devel-1.0.10-0.1.20060mlcs4.i586.rpm
7fb8b1da94b58a405fc248c91a46710a
corporate/4.0/i586/rawshark-1.0.10-0.1.20060mlcs4.i586.rpm
275f67bd5a9c81d2fa681802b17ff148
corporate/4.0/i586/tshark-1.0.10-0.1.20060mlcs4.i586.rpm
6512854ec097ba7abd54f8fa216f6e47
corporate/4.0/i586/wireshark-1.0.10-0.1.20060mlcs4.i586.rpm
0de613b7620d731af50e2f952311e0d4
corporate/4.0/i586/wireshark-tools-1.0.10-0.1.20060mlcs4.i586.rpm
29284ce6df7107031ab98a27eca0a1c5
corporate/4.0/SRPMS/wireshark-1.0.10-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
22ef3658492b8bf0222b00a213b33ddb
corporate/4.0/x86_64/dumpcap-1.0.10-0.1.20060mlcs4.x86_64.rpm
c907ebb1ffd142898a65e4df8c4b98ae
corporate/4.0/x86_64/lib64wireshark0-1.0.10-0.1.20060mlcs4.x86_64.rpm
a61af49a91c9313aa48911240f11b878
corporate/4.0/x86_64/lib64wireshark-devel-1.0.10-0.1.20060mlcs4.x86_64.rpm
c7c476849dd061df9caa056ee435486c
corporate/4.0/x86_64/rawshark-1.0.10-0.1.20060mlcs4.x86_64.rpm
06ea86736d32c321e0f6db14c71eec31
corporate/4.0/x86_64/tshark-1.0.10-0.1.20060mlcs4.x86_64.rpm
1a866f965de14960eec591b4ef91fdb3
corporate/4.0/x86_64/wireshark-1.0.10-0.1.20060mlcs4.x86_64.rpm
619b8cd611129692d4b6948121311336
corporate/4.0/x86_64/wireshark-tools-1.0.10-0.1.20060mlcs4.x86_64.rpm
29284ce6df7107031ab98a27eca0a1c5
corporate/4.0/SRPMS/wireshark-1.0.10-0.1.20060mlcs4.src.rpm
Mandriva Enterprise Server 5:
acb7f0ef708faabc4f8a0107413581ba mes5/i586/dumpcap-1.0.10-0.1mdvmes5.i586.rpm
89771916a201d1877a4e6b3979c9382a
mes5/i586/libwireshark0-1.0.10-0.1mdvmes5.i586.rpm
441055d1c582709fe952c66b0cf0bb3e
mes5/i586/libwireshark-devel-1.0.10-0.1mdvmes5.i586.rpm
8fcc2774a57fe38b3d93ca2be71d485a mes5/i586/rawshark-1.0.10-0.1mdvmes5.i586.rpm
c2c3e70bffbb284c180d38e59ed78647 mes5/i586/tshark-1.0.10-0.1mdvmes5.i586.rpm
a27530dc435f220afad5a0fa66477210
mes5/i586/wireshark-1.0.10-0.1mdvmes5.i586.rpm
3f9f26f368c18086672e723566960fd1
mes5/i586/wireshark-tools-1.0.10-0.1mdvmes5.i586.rpm
8161692312392406d4105dc57fc5e2b6
mes5/SRPMS/wireshark-1.0.10-0.1mdvmes5.src.rpm
Mandriva Enterprise Server 5/X86_64:
98dfad4d56c40915a2d2b5dd35f21962
mes5/x86_64/dumpcap-1.0.10-0.1mdvmes5.x86_64.rpm
337bda567ca9396d3efdcf80d2b816fb
mes5/x86_64/lib64wireshark0-1.0.10-0.1mdvmes5.x86_64.rpm
f46f021b8985694bef66063606f7b6f1
mes5/x86_64/lib64wireshark-devel-1.0.10-0.1mdvmes5.x86_64.rpm
4858f505a59f1fc0f6cf328dc7079c37
mes5/x86_64/rawshark-1.0.10-0.1mdvmes5.x86_64.rpm
b78c0346f33b1a5d365be74b7b7613c6
mes5/x86_64/tshark-1.0.10-0.1mdvmes5.x86_64.rpm
7e0257e5e30b86c2adc8963d750971d6
mes5/x86_64/wireshark-1.0.10-0.1mdvmes5.x86_64.rpm
ee4107ff89ccf88aed9228869bfc2080
mes5/x86_64/wireshark-tools-1.0.10-0.1mdvmes5.x86_64.rpm
8161692312392406d4105dc57fc5e2b6
mes5/SRPMS/wireshark-1.0.10-0.1mdvmes5.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFK8CuPmqjQ0CJFipgRAnN+AKDESHVSyHgy7SSTB2ZVKHujv2P9UwCg4kds
eiZOd30/d1ivSc14kx6fQmE=
=2LhR
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/