Pardus Linux Security Advisory - Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).
7a2756675c858fefab07fe032db2c66d614e3bf57731f0e65770eff5c2169b3f
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-38 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2008-09-06
Severity: 3
Type: Remote
------------------------------------------------------------------------
Summary
=======
Some vulnerabilities have been reported in Wireshark, which can be
exploited by malicious people to cause a DoS (Denial of Service).
Description
===========
1) Various errors within epan/dissectors/packet-ncp2222.inc can be
exploited to cause e.g. a crash or an infinite loop via specially
crafted NCP packets.
2) An error while uncompressing zlib-compressed packet data can be
exploited to cause a crash via specially crafted packets.
Affected packages:
Pardus 2008:
wireshark, all before 1.0.3-22-4
Pardus 2007:
wireshark, all before 1.0.3-22-18
Resolution
==========
There are update(s) for wireshark. You can update them via Package
Manager or with a single command from console:
Pardus 2008:
pisi up wireshark
Pardus 2007:
pisi up wireshark
References
==========
* http://bugs.pardus.org.tr/show_bug.cgi?id=8119
* http://www.wireshark.org/security/wnpa-sec-2008-05.html
* http://secunia.com/advisories/31674
------------------------------------------------------------------------
--
Pınar Yanardağ
Pardus Security Team
http://security.pardus.org.tr