ALT-BU-2015-2505-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-3236
cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.
- http://curl.haxx.se/docs/adv_20150617A.html
- http://curl.haxx.se/docs/adv_20150617A.html
- FEDORA-2015-10155
- FEDORA-2015-10155
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 75385
- 75385
- 91787
- 91787
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- GLSA-201509-02
- GLSA-201509-02
Modified: 2024-11-21
CVE-2015-3237
The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.
- http://curl.haxx.se/docs/adv_20150617B.html
- http://curl.haxx.se/docs/adv_20150617B.html
- FEDORA-2015-10155
- FEDORA-2015-10155
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 75387
- 75387
- 91787
- 91787
- 1036371
- 1036371
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- GLSA-201509-02
- GLSA-201509-02
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-4651
The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- openSUSE-SU-2015:1215
- openSUSE-SU-2015:1215
- DSA-3294
- DSA-3294
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 75317
- 75317
- 1032662
- 1032662
- http://www.wireshark.org/security/wnpa-sec-2015-19.html
- http://www.wireshark.org/security/wnpa-sec-2015-19.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11153
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11153
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=524ed1df6e6126cd63ba419ccb82c83636d77ee4
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=524ed1df6e6126cd63ba419ccb82c83636d77ee4
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-4652
epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x before 1.12.6 does not properly validate digit characters, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the de_emerg_num_list and de_bcd_num functions.
- openSUSE-SU-2015:1215
- openSUSE-SU-2015:1215
- DSA-3294
- DSA-3294
- 75316
- 75316
- 1032662
- 1032662
- http://www.wireshark.org/security/wnpa-sec-2015-20.html
- http://www.wireshark.org/security/wnpa-sec-2015-20.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11201
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11201
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d93be95fc0e7011e8b4ade9171e7e66146063296
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d93be95fc0e7011e8b4ade9171e7e66146063296
- GLSA-201510-03
- GLSA-201510-03