[Full-disclosure] rPSA-2008-0004-1 tshark wireshark



rPath Security Advisory: 2008-0004-1
Published: 2008-01-03
Products:
rPath Linux 1

Rating: Major
Exposure Level Classification:
Indirect User Deterministic Denial of Service
Updated Versions:
tshark=conary.rpath.com@rpl:1/0.99.7-0.1-1
wireshark=conary.rpath.com@rpl:1/0.99.7-0.1-1

rPath Issue Tracking System:
https://issues.rpath.com/browse/RPL-1975

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6440
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6442
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6443
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6444
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6445
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6446
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451

Description:
Previous versions of the wireshark package are vulnerable
to multiple types of Denial of Service attacks, including
crashes and excessive memory consumption. It has not been
determined that these vulnerabilities can be exploited to
execute malicious code.

http://wiki.rpath.com/Advisories:rPSA-2008-0004

Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Relevant Pages

  • [Full-disclosure] rPSA-2007-0202-1 kernel
    ... Products: rPath Linux 1 ... Exposure Level Classification: ... rPath Issue Tracking System: ...
    (Full-Disclosure)
  • rPSA-2007-0202-1 kernel
    ... Products: rPath Linux 1 ... Exposure Level Classification: ... rPath Issue Tracking System: ...
    (Bugtraq)
  • [Full-disclosure] rPSA-2008-0276-1 mercurial mercurial-hgk
    ... rPath Security Advisory: 2008-0276-1 ... Exposure Level Classification: ... rPath Issue Tracking System: ... Note that hgweb is not enabled by default on rPath Linux systems. ...
    (Full-Disclosure)
  • rPSA-2008-0276-1 mercurial mercurial-hgk
    ... rPath Security Advisory: 2008-0276-1 ... Exposure Level Classification: ... rPath Issue Tracking System: ... Note that hgweb is not enabled by default on rPath Linux systems. ...
    (Bugtraq)
  • rPSA-2008-0004-1 tshark wireshark
    ... rPath Security Advisory: 2008-0004-1 ... Exposure Level Classification: ... rPath Issue Tracking System: ... determined that these vulnerabilities can be exploited to ...
    (Bugtraq)