Wireshark-commits: [Wireshark-commits] rev 39643: /trunk-1.4/ /trunk-1.4/docbook/: release-notes.xm
Date: Thu, 27 Oct 2011 21:17:13 GMT
http://anonsvn.wireshark.org/viewvc/viewvc.cgi?view=rev&revision=39643

User: gerald
Date: 2011/10/27 02:17 PM

Log:
 Copy over r39508 from the trunk:
 
   ------------------------------------------------------------------------
   r39508 | gerald | 2011-10-21 12:07:42 -0700 (Fri, 21 Oct 2011) | 6 lines
   Changed paths:
      M /trunk/wiretap/erf.c
 
   From Huzaifa Sidhpurwala of Red Hat Security Response Team:
 
   I found a heap-based buffer overflow, when parsing ERF file format.
   The overflow seems to be controlled by the values read from the file,
   and hence seems exploitable to me.
   ------------------------------------------------------------------------
 
 
 Update the release notes.

Directory: /trunk-1.4/docbook/
  Changes    Path                 Action
  +19 -0     release-notes.xml    Modified

Directory: /trunk-1.4/wiretap/
  Changes    Path          Action
  +20 -0     erf.c         Modified