CVE-2009-3829 CVE-2009-3551 CVE-2009-3550 CVE-2009-3549

Related Vulnerabilities: CVE-2009-3829   CVE-2009-3551   CVE-2009-3550   CVE-2009-3549  

Debian Bug report logs - #553583
CVE-2009-3829 CVE-2009-3551 CVE-2009-3550 CVE-2009-3549

version graph

Reported by: Giuseppe Iuculano <iuculano@debian.org>

Date: Sun, 1 Nov 2009 09:54:02 UTC

Severity: grave

Tags: security

Found in versions wireshark/1.2.2-1, wireshark/1.2.2-2

Fixed in version wireshark/1.2.3-1

Done: Balint Reczey <balint@balintreczey.hu>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Frederic Peters <fpeters@debian.org>:
Bug#553583; Package wireshark. (Sun, 01 Nov 2009 09:54:06 GMT) (full text, mbox, link).


Acknowledgement sent to Giuseppe Iuculano <iuculano@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Frederic Peters <fpeters@debian.org>. (Sun, 01 Nov 2009 09:54:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <iuculano@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2009-3829 CVE-2009-3551 CVE-2009-3550 CVE-2009-3549
Date: Sun, 01 Nov 2009 10:37:56 +0100
Package: wireshark
Severity: grave
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for wireshark.

CVE-2009-3829[0]:
| Integer overflow in wiretap/erf.c in Wireshark before 1.2.2 allows
| remote attackers to execute arbitrary code or cause a denial of
| service (application crash) via a crafted erf file, related to an
| "unsigned integer wrap vulnerability."

CVE-2009-3551[1]:
| Off-by-one error in the dissect_negprot_response function in
| packet-smb.c in the SMB dissector in Wireshark 1.2.0 through 1.2.2
| allows remote attackers to cause a denial of service (application
| crash) via a file that records a malformed packet trace.  NOTE: some of
| these details are obtained from third party information.

CVE-2009-3550[2]:
| The DCERPC/NT dissector in Wireshark 0.10.10 through 1.0.9 and 1.2.0
| through 1.2.2 allows remote attackers to cause a denial of service
| (NULL pointer dereference and application crash) via a file that
| records a malformed packet trace.  NOTE: some of these details are
| obtained from third party information.

CVE-2009-3549[3]:
| packet-paltalk.c in the Paltalk dissector in Wireshark 1.2.0 through
| 1.2.2, on SPARC and certain other platforms, allows remote attackers
| to cause a denial of service (application crash) via a file that
| records a malformed packet trace.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829
    http://security-tracker.debian.org/tracker/CVE-2009-3829
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551
    http://security-tracker.debian.org/tracker/CVE-2009-3551
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550
    http://security-tracker.debian.org/tracker/CVE-2009-3550
[3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549
    http://security-tracker.debian.org/tracker/CVE-2009-3549


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkrtVvEACgkQNxpp46476aoiqwCdGWJG9CgxX9BIUSznE/lrJrnV
4vgAnjnZneMmcrMm15whTlW4aeHfaU8S
=eSSm
-----END PGP SIGNATURE-----




Bug Marked as found in versions wireshark/1.2.2-2. Request was from Giuseppe Iuculano <iuculano@debian.org> to control@bugs.debian.org. (Sun, 01 Nov 2009 15:24:10 GMT) (full text, mbox, link).


Bug Marked as found in versions wireshark/1.2.2-1. Request was from Giuseppe Iuculano <iuculano@debian.org> to control@bugs.debian.org. (Sun, 01 Nov 2009 15:24:11 GMT) (full text, mbox, link).


Reply sent to Balint Reczey <balint@balintreczey.hu>:
You have taken responsibility. (Sun, 01 Nov 2009 19:30:11 GMT) (full text, mbox, link).


Notification sent to Giuseppe Iuculano <iuculano@debian.org>:
Bug acknowledged by developer. (Sun, 01 Nov 2009 19:30:11 GMT) (full text, mbox, link).


Message #14 received at 553583-close@bugs.debian.org (full text, mbox, reply):

From: Balint Reczey <balint@balintreczey.hu>
To: 553583-close@bugs.debian.org
Subject: Bug#553583: fixed in wireshark 1.2.3-1
Date: Sun, 01 Nov 2009 19:14:54 +0000
Source: wireshark
Source-Version: 1.2.3-1

We believe that the bug you reported is fixed in the latest version of
wireshark, which is due to be installed in the Debian FTP archive:

tshark_1.2.3-1_amd64.deb
  to main/w/wireshark/tshark_1.2.3-1_amd64.deb
wireshark-common_1.2.3-1_amd64.deb
  to main/w/wireshark/wireshark-common_1.2.3-1_amd64.deb
wireshark-dev_1.2.3-1_amd64.deb
  to main/w/wireshark/wireshark-dev_1.2.3-1_amd64.deb
wireshark_1.2.3-1.diff.gz
  to main/w/wireshark/wireshark_1.2.3-1.diff.gz
wireshark_1.2.3-1.dsc
  to main/w/wireshark/wireshark_1.2.3-1.dsc
wireshark_1.2.3-1_amd64.deb
  to main/w/wireshark/wireshark_1.2.3-1_amd64.deb
wireshark_1.2.3.orig.tar.gz
  to main/w/wireshark/wireshark_1.2.3.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 553583@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Balint Reczey <balint@balintreczey.hu> (supplier of updated wireshark package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 28 Oct 2009 14:35:20 +0100
Source: wireshark
Binary: wireshark-common wireshark tshark wireshark-dev
Architecture: source amd64
Version: 1.2.3-1
Distribution: unstable
Urgency: high
Maintainer: Frederic Peters <fpeters@debian.org>
Changed-By: Balint Reczey <balint@balintreczey.hu>
Description: 
 tshark     - network traffic analyzer - console version
 wireshark  - network traffic analyzer - GTK+ version
 wireshark-common - network traffic analyzer - common files
 wireshark-dev - network traffic analyzer - development tools
Closes: 552025 553583
Changes: 
 wireshark (1.2.3-1) unstable; urgency=high
 .
   * New upstream release 1.2.3
     - release notes:
       http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html
     - security fixes
        - The Paltalk dissector could crash on alignment-sensitive processors.
          (CVE-2009-3549)
        - The DCERPC/NT dissector could crash. (CVE-2009-3550)
        - The SMB dissector could crash. (CVE-2009-3551)
     (Closes: #553583)
   [ Eloy Paris ]
   * added missing libraries and header files to wireshark-dev (Closes: #552025)
Checksums-Sha1: 
 11c7041875d3ca57c17ac88d5a565ee81f9da4ac 1564 wireshark_1.2.3-1.dsc
 32a8a326524ecd5759dac65f94105f2ec8b5a8cb 19576271 wireshark_1.2.3.orig.tar.gz
 d2265581b965b25aa5eb91de04d02e0c2f29bc15 43469 wireshark_1.2.3-1.diff.gz
 2506eabad8bec8ca0578eca0304f8179fe5424d4 13679868 wireshark-common_1.2.3-1_amd64.deb
 8763f9d7c467d326da0b4ca2b72faf891f7bba51 790772 wireshark_1.2.3-1_amd64.deb
 8bb21f812205d91d037a945a1ff9a3408d0e06f7 128924 tshark_1.2.3-1_amd64.deb
 9da150d5e500f8b59170a186fe88ddbc6b72e40a 789258 wireshark-dev_1.2.3-1_amd64.deb
Checksums-Sha256: 
 39123867b8a7e4ba4dd7fcf8a55b12505f94036e9dc9e81e8cdf8fb321062345 1564 wireshark_1.2.3-1.dsc
 ce607f893dd93c155909e0b4d4438e55ef4655c6ca24611d887d8e58ed3d08dd 19576271 wireshark_1.2.3.orig.tar.gz
 ac0c4243a6fc2f6fad3e04a11eb92694ab3ffd10a9fddb1f43f0d8c89a42bea5 43469 wireshark_1.2.3-1.diff.gz
 9c653669cbc8024b158900efa854648c5f6eba79c5c5d66c081dbc7bc9fb87fb 13679868 wireshark-common_1.2.3-1_amd64.deb
 942c8c21a9da70aaf994801ca1b96d0559e242bc1e321da4f300c72739a5fbeb 790772 wireshark_1.2.3-1_amd64.deb
 b283764aae77a09458f4296d854bd1842236da1c9cb811ecb719224c226b1b34 128924 tshark_1.2.3-1_amd64.deb
 d100e3da81bce09f76346de675c4a26e20cc3f64203857c48405246fb2e32403 789258 wireshark-dev_1.2.3-1_amd64.deb
Files: 
 684b447d1b63458dd7697f5691bc3c8c 1564 net optional wireshark_1.2.3-1.dsc
 24b75982b65d2b7487e980584b085866 19576271 net optional wireshark_1.2.3.orig.tar.gz
 d62a896c5a920b07841b3151ebc8685f 43469 net optional wireshark_1.2.3-1.diff.gz
 cdd2129f29ef6abd559db5d49cfab936 13679868 net optional wireshark-common_1.2.3-1_amd64.deb
 77a58bc09f669598bfaec218679b3801 790772 net optional wireshark_1.2.3-1_amd64.deb
 0fa4d9a403d832d6f508ef6c21f86342 128924 net optional tshark_1.2.3-1_amd64.deb
 bcc7f9ef35e6a999eb60b39a282756e5 789258 devel optional wireshark-dev_1.2.3-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkrtztoACgkQ0/r2+3z8lN3o0wCeMmIVqn7WbIsWRDEv2YpXH7fX
WhQAoLZxz6hLxPV4PbH+6lmFmfIJzW6j
=blYN
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 12 Dec 2009 07:32:08 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 14:08:40 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.