Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 3 Aug 2009 14:05:19 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: Jan Lieskovsky <jlieskov@...hat.com>
cc: oss-security@...ts.openwall.com,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: Wireshark <1.2.1 Multiple DoS


On Mon, 27 Jul 2009, Jan Lieskovsky wrote:

>    any progress while splitting this CVE id into two different ones?
> (or will we need to address the problem of different vulnerable
> Wireshark versions in relevant dissectors in some other way?)

Since the CVE is already out, splitting it might not be appropriate.
I've modified the description to say that RADIUS is also affected in
1.0.8.

- Steve

======================================================
Name: CVE-2009-2560
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560
Reference: CONFIRM:http://www.wireshark.org/security/wnpa-sec-2009-04.html
Reference: BID:35748
Reference: URL:http://www.securityfocus.com/bid/35748
Reference: SECUNIA:35884
Reference: URL:http://secunia.com/advisories/35884
Reference: VUPEN:ADV-2009-1970
Reference: URL:http://www.vupen.com/english/advisories/2009/1970

Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote
attackers to cause a denial of service (crash) via unspecified vectors
in the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissectors.  NOTE:
the RADIUS dissector vulnerability also affects 1.0.8.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.