[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1KuVzY-0005YY-9U@titan.mandriva.com>
Date: Mon, 27 Oct 2008 11:35:00 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2008:215 ] wireshark
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:215
http://www.mandriva.com/security/
_______________________________________________________________________
Package : wireshark
Date : October 27, 2008
Affected: 2008.1, 2009.0, Corporate 4.0
_______________________________________________________________________
Problem Description:
A number of vulnerabilities were discovered in Wireshark that could
cause it to crash or abort while processing malicious packets
(CVE-2008-4680, CVE-2008-4681, CVE-2008-4682, CVE-2008-4683,
CVE-2008-4684, CVE-2008-4685).
This update provides Wireshark 1.0.4, which is not vulnerable to
these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685
http://www.wireshark.org/security/wnpa-sec-2008-06.html
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2008.1:
e22f4724405ce826d30052d6e052fe80 2008.1/i586/dumpcap-1.0.4-0.1mdv2008.1.i586.rpm
f786b038c9d6a116fc6510db3b336ae2 2008.1/i586/libwireshark0-1.0.4-0.1mdv2008.1.i586.rpm
2f14262ab9cfb94f9f8b8896dba61cc7 2008.1/i586/libwireshark-devel-1.0.4-0.1mdv2008.1.i586.rpm
e56d7c558854a2e1ef2ea91766b6be90 2008.1/i586/rawshark-1.0.4-0.1mdv2008.1.i586.rpm
09f56860799e124a5a242059ce5e3906 2008.1/i586/tshark-1.0.4-0.1mdv2008.1.i586.rpm
c9cf1d4ca54215e17e8d7cdf1685ad17 2008.1/i586/wireshark-1.0.4-0.1mdv2008.1.i586.rpm
c70dce2212f9aea72985778558146e10 2008.1/i586/wireshark-tools-1.0.4-0.1mdv2008.1.i586.rpm
5447226b9e6b32d7a6699782fd789508 2008.1/SRPMS/wireshark-1.0.4-0.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64:
01df6ee846ede6e7af2b14146121d002 2008.1/x86_64/dumpcap-1.0.4-0.1mdv2008.1.x86_64.rpm
4a81377783d769b5fb27a4d12b0e8540 2008.1/x86_64/lib64wireshark0-1.0.4-0.1mdv2008.1.x86_64.rpm
61458349625f3efa4e0b4512c0689881 2008.1/x86_64/lib64wireshark-devel-1.0.4-0.1mdv2008.1.x86_64.rpm
de60e75c930e59358a578956d6624c05 2008.1/x86_64/rawshark-1.0.4-0.1mdv2008.1.x86_64.rpm
4cf0a2b2b7eeaf3edffa7e6362bbb3e3 2008.1/x86_64/tshark-1.0.4-0.1mdv2008.1.x86_64.rpm
3d085016598ac39425b4f2f54059256e 2008.1/x86_64/wireshark-1.0.4-0.1mdv2008.1.x86_64.rpm
f277d73cd161359c1ebd2fecfac17dde 2008.1/x86_64/wireshark-tools-1.0.4-0.1mdv2008.1.x86_64.rpm
5447226b9e6b32d7a6699782fd789508 2008.1/SRPMS/wireshark-1.0.4-0.1mdv2008.1.src.rpm
Mandriva Linux 2009.0:
3b078025b09b85e872b053abd37e4654 2009.0/i586/dumpcap-1.0.4-0.1mdv2009.0.i586.rpm
05a76f279cc0bf7fec5cae98ce610cf3 2009.0/i586/libwireshark0-1.0.4-0.1mdv2009.0.i586.rpm
cf4d8be7e83dbfb07658196665f74b3a 2009.0/i586/libwireshark-devel-1.0.4-0.1mdv2009.0.i586.rpm
19934b524aafb76b52a6c00301e9741f 2009.0/i586/rawshark-1.0.4-0.1mdv2009.0.i586.rpm
9e7884192ee091b83473ecc325609673 2009.0/i586/tshark-1.0.4-0.1mdv2009.0.i586.rpm
dc47e7d526ee28f790f47b48058f741a 2009.0/i586/wireshark-1.0.4-0.1mdv2009.0.i586.rpm
34d43760e4b896326792e4c9cab890a8 2009.0/i586/wireshark-tools-1.0.4-0.1mdv2009.0.i586.rpm
61c74b35d70f00511165ac521a98dde7 2009.0/SRPMS/wireshark-1.0.4-0.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64:
6b1f9c880d3fb896b38952b6b1e22806 2009.0/x86_64/dumpcap-1.0.4-0.1mdv2009.0.x86_64.rpm
afb5bc614f48a7ee4c3ca20c5177a0d6 2009.0/x86_64/lib64wireshark0-1.0.4-0.1mdv2009.0.x86_64.rpm
d1caa4d49f1a596c55052670c257aae4 2009.0/x86_64/lib64wireshark-devel-1.0.4-0.1mdv2009.0.x86_64.rpm
8800985eba2fc5d4a780ad296293af43 2009.0/x86_64/rawshark-1.0.4-0.1mdv2009.0.x86_64.rpm
99ef5b9b5398beeed94cf799d9d28f4a 2009.0/x86_64/tshark-1.0.4-0.1mdv2009.0.x86_64.rpm
cb8f15f3e06620afb245ce8b8246173a 2009.0/x86_64/wireshark-1.0.4-0.1mdv2009.0.x86_64.rpm
ea3b906fa428008dfd1f9520cc71ec33 2009.0/x86_64/wireshark-tools-1.0.4-0.1mdv2009.0.x86_64.rpm
61c74b35d70f00511165ac521a98dde7 2009.0/SRPMS/wireshark-1.0.4-0.1mdv2009.0.src.rpm
Corporate 4.0:
fe3c0ee6cec002478c8ddd3818df8f58 corporate/4.0/i586/dumpcap-1.0.4-0.1.20060mlcs4.i586.rpm
aa1101fdb86ee3b9785dfd1ee36b49db corporate/4.0/i586/libwireshark0-1.0.4-0.1.20060mlcs4.i586.rpm
37767e7e662d8e4179fb7df3ba9df363 corporate/4.0/i586/libwireshark-devel-1.0.4-0.1.20060mlcs4.i586.rpm
33dc56d2f00eb1a9635c48b0006e2667 corporate/4.0/i586/rawshark-1.0.4-0.1.20060mlcs4.i586.rpm
a2b4933ad53086ab8cb330451b651794 corporate/4.0/i586/tshark-1.0.4-0.1.20060mlcs4.i586.rpm
64b2d0fdd6d11dc5e47c302668417d93 corporate/4.0/i586/wireshark-1.0.4-0.1.20060mlcs4.i586.rpm
bf55b9c94bbfa483176f2c0e32cf0081 corporate/4.0/i586/wireshark-tools-1.0.4-0.1.20060mlcs4.i586.rpm
0114242086297b135360297a51cb8ada corporate/4.0/SRPMS/wireshark-1.0.4-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
2327502106d5c8c11d8801f65502f708 corporate/4.0/x86_64/dumpcap-1.0.4-0.1.20060mlcs4.x86_64.rpm
b2e80b25d44b2e7b9dc91a43978393f1 corporate/4.0/x86_64/lib64wireshark0-1.0.4-0.1.20060mlcs4.x86_64.rpm
804d41d8e9a551126f5ac9b80228da97 corporate/4.0/x86_64/lib64wireshark-devel-1.0.4-0.1.20060mlcs4.x86_64.rpm
75daf8f97a3ea9466bba86477aeb429b corporate/4.0/x86_64/rawshark-1.0.4-0.1.20060mlcs4.x86_64.rpm
ef5b5422c855fea0c41d3f81bd0f2f60 corporate/4.0/x86_64/tshark-1.0.4-0.1.20060mlcs4.x86_64.rpm
37621c9c2bf74767574fb47f9695318e corporate/4.0/x86_64/wireshark-1.0.4-0.1.20060mlcs4.x86_64.rpm
ad5f8bc8ac1ece328b86df0bdb60f44d corporate/4.0/x86_64/wireshark-tools-1.0.4-0.1.20060mlcs4.x86_64.rpm
0114242086297b135360297a51cb8ada corporate/4.0/SRPMS/wireshark-1.0.4-0.1.20060mlcs4.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFJBc/dmqjQ0CJFipgRAibfAKDiwYdu7Voi+N6kJPDppBn3cVw5yACfToDT
Z30Afr8IjRUaVaYht5/CeTc=
=qMDs
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists