------------------------------------------------------------------------ Pardus Linux Security Advisory 2008-38 security@pardus.org.tr ------------------------------------------------------------------------ Date: 2008-09-06 Severity: 3 Type: Remote ------------------------------------------------------------------------ Summary ======= Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). Description =========== 1) Various errors within epan/dissectors/packet-ncp2222.inc can be exploited to cause e.g. a crash or an infinite loop via specially crafted NCP packets. 2) An error while uncompressing zlib-compressed packet data can be exploited to cause a crash via specially crafted packets. Affected packages: Pardus 2008: wireshark, all before 1.0.3-22-4 Pardus 2007: wireshark, all before 1.0.3-22-18 Resolution ========== There are update(s) for wireshark. You can update them via Package Manager or with a single command from console: Pardus 2008: pisi up wireshark Pardus 2007: pisi up wireshark References ========== * http://bugs.pardus.org.tr/show_bug.cgi?id=8119 * http://www.wireshark.org/security/wnpa-sec-2008-05.html * http://secunia.com/advisories/31674 ------------------------------------------------------------------------ -- Pınar Yanardağ Pardus Security Team http://security.pardus.org.tr _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/