Thursday, May 28, 2009

CERT-In Vulnerability Note CIVN-2009-64

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Wireshark Denial of Service Vulnerability
http://www.cert-in.org.in/vulnerability/civn-2009-64.htm

Original Issue Date:May 28, 2009

Severity Rating: Medium

Affected Softwares

    * Wireshark versions 0.8.20 to 1.0.7

Overview

A vulnerability has been reported in Wireshark versions 0.8.20 to 1.0.7
0.99.6 which could be exploited by the remote attackers to cause Denial of
Service condition on the systems having the affected version of
application.

Description

This vulnerability is caused due to an error in the PCNFSD dissector, which
can be exploited by the attacker to crash (Denial of Service) the
application. This vulnerability can be exploited by remote attackers by
tricking a user into reading a maliciously crafted PCNFSD packet.

Solution

Upgrade to Wireshark 1.0.8.
http://www.wireshark.org/

Vendor Information

Wireshark
http://www.wireshark.org/security/wnpa-sec-2009-03.html

References

SecurityFocus
http://www.securityfocus.com/bid/35081

Secunia
http://secunia.com/advisories/35201/

VUPEN Security
http://www.vupen.com/english/advisories/2009/1408

SecurityTracker
http://securitytracker.com/alerts/2009/May/1022274.html

CWE Name
CWE-399

Disclaimer

The information provided herein is on "as is" basis, without warranty of
any kind.

Contact Information


Phone: +91-11-24368572

Postal address

Indian Computer Emergency Response Team (CERT-In)
Ministry of Communications and Information Technology
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003

Note: Please do not reply to this e-mail. For further queries contact
CERT-In Information Desk. Email: info@cert-in.org.in

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)

wsBVAwUBSh6PzXWXeYNsoT30AQrVmAf+PqInjnWQFkgSg6UkVaGtz2qTWuUx8sAo
aZ3b0tDGJTMlIn2D3iQKW5Lf63QmweYTWv6g7hXEVeH56ki0zrIBJIw2JBqMr2B2
fWuEksc+vHEqUEXvyq9fVzpuwxEGmBNyK9d9vmwvs2aNlS1G6ABjZrhU5aV7pAf6
405s+jGCi9LoQZ5HRcOqxvsZxA3zxppDLwgNjyBd0/kWvBn9lywp1b/p9b770ZyJ
pt8r2lBpfNqpwAN+VPNP1bVz/9Kh5uqMUglMqkn1GaAfNFG7ru648OsYvwdlEE4Q
i9iF5tiubmpqoGIAJXt71/a5stQlZxjQUcBWztwaaze8aOoKNhx43w==
=we/t
-----END PGP SIGNATURE-----

Wednesday, May 6, 2009

CVE Announce - May 6, 2009 (opt-in newsletter from the CVE Web site)

Welcome to the latest edition of the CVE-Announce e-newsletter.
This email newsletter is designed to bring recent news about CVE,
such as new versions, upcoming conferences, new Web site features,
etc. right to your emailbox. Common Vulnerabilities and Exposures
(CVE) is the standard for information security vulnerability
names. CVE content results from the collaborative efforts of the
CVE Editorial Board, which is comprised of leading representatives
from the information security community. Details on subscribing
(and unsubscribing) to the email newsletter are at the end. Please
feel free to pass this newsletter on to interested colleagues.

Comments: cve@mitre.org

-------------------------------------------------------
CVE-Announce e-newsletter/May 6, 2009
-------------------------------------------------------

Contents:

1. Feature Story
2. UPCOMING EVENT
3. Also in this Issue
4. Details/Credits + Subscribing and Unsubscribing

FEATURE STORY:


CVE COMPATIBILIY UPDATES

(1) Beijing Topsec Co., Ltd. achieved the second phase of the CVE
Compatibility Process by submitting a CVE Compatibility
Questionnaire for Topsec Intrusion Protection System (TopIDP).

(2) SoftRun, Inc. achieved the second phase of the CVE
Compatibility Process by submitting a CVE Compatibility
Questionnaire for Inciter Vulnerability Manager.

(3) IPolicy Networks declared that its iPolicy Security Manager
and its iPolicy Intrusion Prevention Firewall are CVE-Compatible.

(4) H3C Technologies Co., Ltd. declared that its SecPath T Series
IPS and its SecBlade IPS will be CVE-Compatible.

In Phase 2 of the compatibility process the organization's
completed compatibility requirements evaluation questionnaire is
posted on the CVE Web site while it is evaluated by MITRE as the
final step towards the product or service being registered as
"Officially CVE-Compatible. For additional information and to
review the complete list of all products and services
participating in the compatibility program, visit the
CVE-Compatible Products and Services section.


LINKS:


Beijing Topsec Co., Ltd. - http://www.topsec.com.cn

SoftRun, Inc. - http://www.softrun.com

IPolicy Networks - http://www.ipolicynetworks.com

H3C Technologies Co., Ltd. - http://www.h3c.com.cn

CVE-Compatible Products and Services -
http://cve.mitre.org/compatible


---------------------------------------------------------------
UPCOMING EVENT:


SCAP Developer Days 2009

The MITRE Corporation is scheduled to host the first-ever "SCAP
Developer Days" conference on June 8-12, 2009, at MITRE in
Bedford, Massachusetts, USA. This five-day conference will be
technical in nature and focus on the U.S. National Institute of
Standards and Technology's (NIST) Security Content Automation
Protocol (SCAP).

The purpose of the event is for the community to discuss SCAP in
technical detail and to derive solutions that benefit all
concerned parties. Currently scheduled discussion topics include
NIST SP 800-126, SCAP content management, lifecycle, validation,
and remediation; OVAL, XCCDF, emerging specifications, and
perceived gaps in standards coverage; ontology; and use cases.

For additional information and to register visit
http://www.mitre.org/register/scap/.


---------------------------------------------------------------
ALSO IN THIS ISSUE:


* MITRE Hosts "Making Security Measurable" Booth at "RSA 2009"


Read these stories and more news at http://cve.mitre.org/news


---------------------------------------------------------------
Details/Credits + Subscribing and Unsubscribing

Managing Editor: David Mann, Information Security Technical
Center. Writer: Bob Roberge. The MITRE Corporation (www.mitre.org)
maintains CVE and provides impartial technical guidance to the CVE
Editorial Board on all matters related to ongoing development of
CVE.

To unsubscribe from the CVE-Announce e-newsletter, open a new
email message and copy the following text to the BODY of the
message "SIGNOFF CVE-Announce-list", then send the message to:
listserv@lists.mitre.org. To subscribe, send an email message to
listserv@lists.mitre.org with the following text in the BODY of
the message: "SUBSCRIBE CVE-Announce-List".

Copyright 2009, The MITRE Corporation. CVE and the CVE logo are
registered trademarks of The MITRE Corporation.

For more information about CVE, visit the CVE Web site at
http://cve.mitre.org or send an email to cve@mitre.org. Learn more
about Making Security Measurable at
http://measurablesecurity.mitre.org.