Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 11 Jan 2012 23:11:18 -0700
From: Kurt Seifried <>
CC: "Steven M. Christey" <>,
        Agostino Sarubbo <>
Subject: Re: CVE request: Wireshark multiple vulnerabilities

On 01/11/2012 07:20 PM, Steven M. Christey wrote:
> On Wed, 11 Jan 2012, Kurt Seifried wrote:
>> On 01/11/2012 09:19 AM, Agostino Sarubbo wrote:
>>> According to secunia advisory: :
>>> Multiple vulnerabilities have been reported in Wireshark, which can be
>>> exploited by malicious people to cause a DoS (Denial of Service) and
>>> compromise a user's system.
>>> 1) NULL pointer dereference errors when reading certain packet
>>> information can
>>> be exploited to cause a crash.
> In this case, if a network monitor can be crashed, an attacker might
> be able to launch an attack undetected.  As such, NULL pointer
> dereferences and other crashers in security-relevant products often
> count for CVEs, so Kurt, please assign one for this.
> See for
> further explanation from me.
> - Steve
>From what I read the first #1 and #2 (secunia) map to wireshark
wnpa-sec-2012-02.html and wnpa-sec-2012-03.html respectively, so they
should be all good? Or did I misread it (this is entirely possible =).


-- Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ