Description: | Description: The remote host is missing an update to wireshark announced via advisory FEDORA-2010-13427.
References:
[ 1 ] Bug #604308 - CVE-2010-2287 CVE-2010-2995 wireshark: SigComp UDVM dissector buffer overruns https://bugzilla.redhat.com/show_bug.cgi?id=604308 [ 2 ] Bug #604302 - CVE-2010-2286 wireshark: SigComp UDVM dissector infinite loop https://bugzilla.redhat.com/show_bug.cgi?id=604302 [ 3 ] Bug #604292 - CVE-2010-2284 wireshark: ASN.1 BER dissector stack overrun https://bugzilla.redhat.com/show_bug.cgi?id=604292 [ 4 ] Bug #604290 - CVE-2010-2283 wireshark: SMB dissector NULL pointer dereference https://bugzilla.redhat.com/show_bug.cgi?id=604290 [ 5 ] Bug #590613 - CVE-2010-1455 wireshark: DOCSIS dissector crash https://bugzilla.redhat.com/show_bug.cgi?id=590613 [ 6 ] Bug #623843 - CVE-2010-2992 CVE-2010-2993 wireshark: 1.2.10 corrects multiple vulnerabilities https://bugzilla.redhat.com/show_bug.cgi?id=623843
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update wireshark' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-13427
Risk factor : Critical
CVSS Score: 10.0
|