[<prev] [next>] [day] [month] [year] [list]
Message-ID: <48C1D8D1.2020202@pardus.org.tr>
Date: Sat, 06 Sep 2008 04:11:45 +0300
From: Pınar Yanardağ <pinar@...dus.org.tr>
To: stable@...dus.org.tr
Cc: full-disclosure@...ts.grok.org.uk
Subject: [PLSA 2008-38] Wireshark: Denial of Service
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-38 security@...dus.org.tr
------------------------------------------------------------------------
Date: 2008-09-06
Severity: 3
Type: Remote
------------------------------------------------------------------------
Summary
=======
Some vulnerabilities have been reported in Wireshark, which can be
exploited by malicious people to cause a DoS (Denial of Service).
Description
===========
1) Various errors within epan/dissectors/packet-ncp2222.inc can be
exploited to cause e.g. a crash or an infinite loop via specially
crafted NCP packets.
2) An error while uncompressing zlib-compressed packet data can be
exploited to cause a crash via specially crafted packets.
Affected packages:
Pardus 2008:
wireshark, all before 1.0.3-22-4
Pardus 2007:
wireshark, all before 1.0.3-22-18
Resolution
==========
There are update(s) for wireshark. You can update them via Package
Manager or with a single command from console:
Pardus 2008:
pisi up wireshark
Pardus 2007:
pisi up wireshark
References
==========
* http://bugs.pardus.org.tr/show_bug.cgi?id=8119
* http://www.wireshark.org/security/wnpa-sec-2008-05.html
* http://secunia.com/advisories/31674
------------------------------------------------------------------------
--
Pınar Yanardağ
Pardus Security Team
http://security.pardus.org.tr
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists