Date:         Thu, 15 Nov 2007 14:11:27 -0600
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA for wireshark on SL4.x i386/x86_64
Comments: To: scientific-linux-errata@fnal.gov

Synopsis:	Low: wireshark security and bug fix update
Issue date:	2007-11-15
CVE Names:	CVE-2007-3389 CVE-2007-3390 CVE-2007-3391
                 CVE-2007-3392 CVE-2007-3393

Several denial of service bugs were found in Wireshark's HTTP, iSeries, DCP
ETSI, SSL, MMS, DHCP and BOOTP protocol dissectors. It was possible for
Wireshark to crash or stop responding if it read a malformed packet off the
network. (CVE-2007-3389, CVE-2007-3390, CVE-2007-3391, CVE-2007-3392,
CVE-2007-3393)

Wireshark would interpret certain completion codes incorrectly when
dissecting IPMI traffic. Additionally, IPMI 2.0 packets would be reported
as malformed IPMI traffic.

SL 4.x

   SRPMS:
wireshark-0.99.6-EL4.1.src.rpm
   i386:
wireshark-0.99.6-EL4.1.i386.rpm
wireshark-gnome-0.99.6-EL4.1.i386.rpm
   x86_64:
wireshark-0.99.6-EL4.1.x86_64.rpm
wireshark-gnome-0.99.6-EL4.1.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2007-3389 wireshark SL4.x i386/x86_64

Low: wireshark security and bug fix update

Summary

Date:         Thu, 15 Nov 2007 14:11:27 -0600Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA for wireshark on SL4.x i386/x86_64Comments: To: scientific-linux-errata@fnal.govSynopsis:	Low: wireshark security and bug fix updateIssue date:	2007-11-15CVE Names:	CVE-2007-3389 CVE-2007-3390 CVE-2007-3391                 CVE-2007-3392 CVE-2007-3393Several denial of service bugs were found in Wireshark's HTTP, iSeries, DCPETSI, SSL, MMS, DHCP and BOOTP protocol dissectors. It was possible forWireshark to crash or stop responding if it read a malformed packet off thenetwork. (CVE-2007-3389, CVE-2007-3390, CVE-2007-3391, CVE-2007-3392,CVE-2007-3393)Wireshark would interpret certain completion codes incorrectly whendissecting IPMI traffic. Additionally, IPMI 2.0 packets would be reportedas malformed IPMI traffic.SL 4.x   SRPMS:wireshark-0.99.6-EL4.1.src.rpm   i386:wireshark-0.99.6-EL4.1.i386.rpmwireshark-gnome-0.99.6-EL4.1.i386.rpm   x86_64:wireshark-0.99.6-EL4.1.x86_64.rpmwireshark-gnome-0.99.6-EL4.1.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News