Description: | Description: The remote host is missing an update to wireshark announced via advisory FEDORA-2011-2620.
References:
[ 1 ] Bug #676232 - CVE-2011-0538 Wireshark: memory corruption when reading a malformed pcap file (upstream bug #5652) https://bugzilla.redhat.com/show_bug.cgi?id=676232 [ 2 ] Bug #678198 - CVE-2011-0713 Wireshark: heap-based buffer overflow when reading malformed Nokia DCT3 phone signalling traces https://bugzilla.redhat.com/show_bug.cgi?id=678198 [ 3 ] Bug #639486 - CVE-2010-3445 wireshark: stack overflow in BER dissector https://bugzilla.redhat.com/show_bug.cgi?id=639486 [ 4 ] Bug #681760 - CVE-2011-1143 Wireshark: Null pointer dereference causing application crash when reading malformed pcap file https://bugzilla.redhat.com/show_bug.cgi?id=681760 [ 5 ] Bug #681754 - CVE-2011-1140 Wireshark: Multiple stack consumption vulnerabilities caused DoS via crafted SMB or CLDAP packet https://bugzilla.redhat.com/show_bug.cgi?id=681754 [ 6 ] Bug #681753 - CVE-2011-1138 Wireshark: Off-by-one error in the dissect_6lowpan_iphc function causes application crash (Denial Of Service) https://bugzilla.redhat.com/show_bug.cgi?id=681753 [ 7 ] Bug #681748 - CVE-2011-1139 Wireshark: Denial Of Service (application crash) via a pcap-ng file that contains a large packet-length field https://bugzilla.redhat.com/show_bug.cgi?id=681748 [ 8 ] Bug #681756 - CVE-2011-1141 Wireshark: Malformed LDAP filter string causes Denial of Service via excessive memory consumption https://bugzilla.redhat.com/show_bug.cgi?id=681756
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update wireshark' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-2620
Risk factor : Critical
CVSS Score: 8.3
|