|
Message-ID: <Pine.GSO.4.51.0905291716380.29163@faron.mitre.org> Date: Fri, 29 May 2009 17:16:44 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com Subject: Re: CVE request: Wireshark ====================================================== Name: CVE-2009-1829 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829 Reference: CONFIRM:http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0095 Reference: CONFIRM:http://www.wireshark.org/security/wnpa-sec-2009-03.html Reference: BID:35081 Reference: URL:http://www.securityfocus.com/bid/35081 Reference: OSVDB:54629 Reference: URL:http://osvdb.org/54629 Reference: SECTRACK:1022274 Reference: URL:http://www.securitytracker.com/id?1022274 Reference: SECUNIA:35201 Reference: URL:http://secunia.com/advisories/35201 Reference: VUPEN:ADV-2009-1408 Reference: URL:http://www.vupen.com/english/advisories/2009/1408 Reference: XF:wireshark-pcnfsd-dos(50686) Reference: URL:http://xforce.iss.net/xforce/xfdb/50686 Unspecified vulnerability in the PCNFSD dissector in Wireshark 0.8.20 through 1.0.7 allows remote attackers to cause a denial of service (crash) via crafted PCNFSD packets.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.