Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 1 Apr 2009 14:30:08 -0400 (EDT)
From: "Steven M. Christey" <>
Subject: Re: CVE Request: Wireshark DoS

On Wed, 1 Apr 2009, Pinar Yanardag wrote:
> Yesterday, I came upon the following Secunia advisory [1] about Wireshark 1.0.6:

Name: CVE-2009-1210
Status: Candidate
Reference: MILW0RM:8308
Reference: URL:
Reference: BID:34291
Reference: URL:
Reference: SECUNIA:34542
Reference: URL:
Reference: XF:wireshark-pndcp-format-string(49512)
Reference: URL:

Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in
Wireshark 1.0.6 and earlier allows remote attackers to execute
arbitrary code via a PN-DCP packet with format string specifiers in
the station name.  NOTE: some of these details are obtained from third
party information.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.