1
Candidate: CVE-2013-3556
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556
5
http://www.wireshark.org/security/wnpa-sec-2013-25.html
6
http://www.openwall.com/lists/oss-security/2013/05/20/7
8
The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER
9
dissector in Wireshark before r48943 has an incorrect pointer dereference
10
during a comparison, which allows remote attackers to cause a denial of
11
service (application crash) via a malformed packet.
14
sarnold> apparently only in trunk, see also CVE-2013-3557
16
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709167
22
upstream: http://anonsvn.wireshark.org/viewvc?view=revision&revision=48943
23
upstream_wireshark: released (1.8.7, 1.6.15)
24
lucid_wireshark: not-affected (1.2.7-1)
25
precise_wireshark: not-affected (1.6.7-1)
26
quantal_wireshark: not-affected (1.8.2-2)
27
raring_wireshark: not-affected (1.8.2-5)
28
devel_wireshark: not-affected (1.8.6-3)