Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Wireshark
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Wireshark
ID: DSA-3505-1
Distribution: Debian
Plattformen: Debian sid, Debian wheezy, Debian jessie, Debian stretch
Datum: Fr, 4. März 2016, 20:30
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8711
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8724
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8728
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8733
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8727
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8718
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8730
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8729
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8716
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8719
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8717
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8720
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8712
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8723
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8722
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8725
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8726
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8714
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8715
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8713
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8732
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7830

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3505-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 04, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : wireshark
CVE ID : CVE-2015-7830 CVE-2015-8711 CVE-2015-8712 CVE-2015-8713
CVE-2015-8714 CVE-2015-8715 CVE-2015-8716 CVE-2015-8717
CVE-2015-8718 CVE-2015-8719 CVE-2015-8720 CVE-2015-8721
CVE-2015-8722 CVE-2015-8723 CVE-2015-8724 CVE-2015-8725
CVE-2015-8726 CVE-2015-8727 CVE-2015-8728 CVE-2015-8729
CVE-2015-8730 CVE-2015-8732 CVE-2015-8733

Multiple vulnerabilities were discovered in the dissectors/parsers for
Pcapng, NBAP, UMTS FP, DCOM, AllJoyn, T.38, SDP, NLM, DNS, BED, SCTP,
802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A, Ascend, NBAP, ZigBee ZCL
and Sniffer which could result in denial of service.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.8.2-5wheezy17.

For the stable distribution (jessie), these problems have been fixed in
version 1.12.1+g01b65bf-4+deb8u4.

For the testing distribution (stretch), these problems have been fixed
in version 2.0.2+ga16e22e-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.0.2+ga16e22e-1.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=Ltni
-----END PGP SIGNATURE-----
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung