Description: | Description:
The remote host is missing an update to wireshark announced via advisory FEDORA-2008-7894.
Update Information:
Upgrade to upstream version 1.0.3. Detailed upstream release notes: http://www.wireshark.org/docs/relnotes/wireshark-1.0.3.html Security issues addressed in the new upstream version: http://www.wireshark.org/security/wnpa- sec-2008-05.html
ChangeLog:
* Wed Sep 10 2008 Radek Vokál 1.0.3-1 - upgrade to 1.0.3, fixes several security issues (#461254) * Fri Jul 18 2008 Radek Vokál 1.0.2-1 - upgrade to 1.0.2, fixes a few security issues
References:
[ 1 ] Bug #461242 - CVE-2008-3146 wireshark: multiple buffer overflows in NCP dissector https://bugzilla.redhat.com/show_bug.cgi?id=461242 [ 2 ] Bug #461243 - CVE-2008-3932 wireshark: infinite loop in the NCP dissector https://bugzilla.redhat.com/show_bug.cgi?id=461243 [ 3 ] Bug #461244 - CVE-2008-3933 wireshark: crash triggered by zlib-compressed packet data https://bugzilla.redhat.com/show_bug.cgi?id=461244 [ 4 ] Bug #461245 - CVE-2008-3934 wireshark: crash via crafted Tektronix .rf5 file https://bugzilla.redhat.com/show_bug.cgi?id=461245
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update wireshark' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2008-7894
Risk factor : Critical
CVSS Score: 10.0
|