Secunia Security Advisory - Mandriva has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).
ad9484de2f8d0ba21d2cff7f7e5d45e9b3f3faa21d10b97f96cc42f9d53357e6
----------------------------------------------------------------------
To improve our services to our customers, we have made a number of
additions to the Secunia Advisories and have started translating the
advisories to German.
The improvements will help our customers to get a better
understanding of how we reached our conclusions, how it was rated,
our thoughts on exploitation, attack vectors, and scenarios.
This includes:
* Reason for rating
* Extended description
* Extended solution
* Exploit code or links to exploit code
* Deep links
Read the full description:
http://corporate.secunia.com/products/48/?r=l
Contact Secunia Sales for more information:
http://corporate.secunia.com/how_to_buy/15/?r=l
----------------------------------------------------------------------
TITLE:
Mandriva update for wireshark
SECUNIA ADVISORY ID:
SA22692
VERIFY ADVISORY:
http://secunia.com/advisories/22692/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/
Mandriva Linux 2006
http://secunia.com/product/9020/
DESCRIPTION:
Mandriva has issued an update for wireshark. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service).
For more information:
SA22590
SOLUTION:
Apply updated packages.
Mandriva Linux 2006
6d9200ceb28c080700a14c5082d06144
2006.0/i586/libwireshark0-0.99.4-0.1.20060mdk.i586.rpm
846bf319dbf28977697f0360e6c9c3bf
2006.0/i586/tshark-0.99.4-0.1.20060mdk.i586.rpm
cf4c6ad8bcc4e8f1d0f30747e43629a0
2006.0/i586/wireshark-0.99.4-0.1.20060mdk.i586.rpm
7c298b8216d885c501698333a351a6df
2006.0/i586/wireshark-tools-0.99.4-0.1.20060mdk.i586.rpm
da584fd84e4eaa96134eae8bb6b2ccd9
2006.0/SRPMS/wireshark-0.99.4-0.1.20060mdk.src.rpm
Mandriva Linux 2006/X86_64
5cc25cf7a14362017b627804a23415ce
2006.0/x86_64/lib64wireshark0-0.99.4-0.1.20060mdk.x86_64.rpm
a30498851a759f07b8cebcdebb0f906b
2006.0/x86_64/tshark-0.99.4-0.1.20060mdk.x86_64.rpm
cafef7ec7d7df699ca288ae03ed37c67
2006.0/x86_64/wireshark-0.99.4-0.1.20060mdk.x86_64.rpm
f84e2b12d83f53f0032992ead38cacff
2006.0/x86_64/wireshark-tools-0.99.4-0.1.20060mdk.x86_64.rpm
da584fd84e4eaa96134eae8bb6b2ccd9
2006.0/SRPMS/wireshark-0.99.4-0.1.20060mdk.src.rpm
Mandriva Linux 2007
3d1f3895ce1a440d94768fed10657cc6
2007.0/i586/libwireshark0-0.99.4-0.1mdv2007.0.i586.rpm
ef44905cba00cfb7ba5d72e4d45b4dee
2007.0/i586/tshark-0.99.4-0.1mdv2007.0.i586.rpm
21ef07d16228990f81952e6a9d0d4c02
2007.0/i586/wireshark-0.99.4-0.1mdv2007.0.i586.rpm
60cf791c1bdb8819e69da5a31381fbf7
2007.0/i586/wireshark-tools-0.99.4-0.1mdv2007.0.i586.rpm
7205c72932f614d8b4bcc7ac214a3cd5
2007.0/SRPMS/wireshark-0.99.4-0.1mdv2007.0.src.rpm
Mandriva Linux 2007/X86_64
3c0c94604f22665270ecfd5ea4ef63b8
2007.0/x86_64/lib64wireshark0-0.99.4-0.1mdv2007.0.x86_64.rpm
2f50e6bdb122c99a8ccfe265bd5e9871
2007.0/x86_64/tshark-0.99.4-0.1mdv2007.0.x86_64.rpm
d6b35a2cc4871b09e65c97d438d8e5aa
2007.0/x86_64/wireshark-0.99.4-0.1mdv2007.0.x86_64.rpm
8dbd4f0e7cb7165e0877fead9b767aa8
2007.0/x86_64/wireshark-tools-0.99.4-0.1mdv2007.0.x86_64.rpm
7205c72932f614d8b4bcc7ac214a3cd5
2007.0/SRPMS/wireshark-0.99.4-0.1mdv2007.0.src.rpm
ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2006:195
OTHER REFERENCES:
SA22590:
http://secunia.com/advisories/22590/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------