Description: | Description:
The remote host is missing an update to wireshark announced via advisory FEDORA-2008-7936.
Update Information:
Upgrade to upstream version 1.0.3. Detailed upstream release notes: http://www.wireshark.org/docs/relnotes/wireshark-1.0.3.html Security issues addressed in the new upstream version: http://www.wireshark.org/security /wnpa-sec-2008-05.html
ChangeLog:
* Wed Sep 10 2008 Radek Vokál 1.0.3-1 - upgrade to 1.0.3 - Security-related bugs in the NCP dissector, zlib compression code, and Tektronix .rf5 file parser have been fixed. - WPA group key decryption is now supported. - A bug that could cause packets to be wrongly dissected as Redback Lawful Intercept has been fixed. * Fri Jul 11 2008 Radek Vokál 1.0.2-1 - upgrade to 1.0.2, several security vulnarabilities fixed * Sun Jun 29 2008 Dennis Gilmore 1.0.0-3 - add sparc arches to -fPIE
References:
[ 1 ] Bug #461242 - CVE-2008-3146 wireshark: multiple buffer overflows in NCP dissector https://bugzilla.redhat.com/show_bug.cgi?id=461242 [ 2 ] Bug #461243 - CVE-2008-3932 wireshark: infinite loop in the NCP dissector https://bugzilla.redhat.com/show_bug.cgi?id=461243 [ 3 ] Bug #461244 - CVE-2008-3933 wireshark: crash triggered by zlib-compressed packet data https://bugzilla.redhat.com/show_bug.cgi?id=461244 [ 4 ] Bug #461245 - CVE-2008-3934 wireshark: crash via crafted Tektronix .rf5 file https://bugzilla.redhat.com/show_bug.cgi?id=461245
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update wireshark' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2008-7936
Risk factor : Critical
CVSS Score: 10.0
|