diff options
author | marcus <marcus@FreeBSD.org> | 2009-03-23 01:10:57 +0800 |
---|---|---|
committer | marcus <marcus@FreeBSD.org> | 2009-03-23 01:10:57 +0800 |
commit | 1a4340b3c3b736d37a99ad188648221a0460593b (patch) | |
tree | e43ae6c7296ba68a1985b289f05c3f519295cd8b /security/vuxml | |
parent | e39a9433dece4c3cfa8c49171663cf671190da01 (diff) | |
download | freebsd-ports-graphics-1a4340b3c3b736d37a99ad188648221a0460593b.tar.gz freebsd-ports-graphics-1a4340b3c3b736d37a99ad188648221a0460593b.tar.zst freebsd-ports-graphics-1a4340b3c3b736d37a99ad188648221a0460593b.zip |
Add an entry for Wireshark less than or equal to 1.0.5 pertaining to
multiple DoS situations as described at http://www.wireshark.org/security/wnpa-sec-2009-01.html.
PR: 131688
Submitted by: Mark Foster <mark@foster.cc>
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 44a89341344..5e48b4d66ab 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="f6f19735-9245-4918-8a60-87948ebb4907"> + <topic>wireshark -- Wireshark 1.0.5 Multiple Denial of Service + Vulnerabilities</topic> + <affects> + <package> + <name>wireshark</name> + <range> + <le>1.0.5</le> + <ge>0.99.6</ge> + </range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Vendor reports:</p> + <blockquote + cite="http://www.wireshark.org/security/wnpa-sec-2009-01.html"> + <p>On non-Windows systems Wireshark could crash if the HOME + environment variable contained sprintf-style string formatting + characters. + Wireshark could crash while reading a malformed NetScreen snoop + file. + Wireshark could crash while reading a Tektronix K12 text capture + file. + </p> + </blockquote> + </body> + </description> + <references> + <url>http://www.wireshark.org/security/wnpa-sec-2009-01.html</url> + </references> + <dates> + <discovery>2009-02-06</discovery> + <entry>2009-03-22</entry> + </dates> + </vuln> <vuln vid="72cba7b0-13cd-11de-a964-0030843d3802"> <topic>netatalk -- arbitrary command execution in papd daemon</topic> <affects> |