Description: | Description: The remote host is missing an update to wireshark announced via advisory FEDORA-2011-7821.
Update Information:
Upgrade to latest release, fixing few security bugs. See http://www.wireshark.org/docs/relnotes/wireshark-1.4.7.html.
References:
[ 1 ] Bug #710109 - CVE-2011-2175 wireshark: Heap-based buffer over-read in Visual Networks dissector https://bugzilla.redhat.com/show_bug.cgi?id=710109 [ 2 ] Bug #710097 - CVE-2011-2174 wireshark: Double-free flaw by uncompressing of a zlib compressed packet https://bugzilla.redhat.com/show_bug.cgi?id=710097 [ 3 ] Bug #710039 - CVE-2011-1959 wireshark: Stack-based buffer over-read from tvbuff buffer when reading snoop capture files https://bugzilla.redhat.com/show_bug.cgi?id=710039 [ 4 ] Bug #710021 - CVE-2011-1957 wireshark: Infinite loop in the DICOM dissector https://bugzilla.redhat.com/show_bug.cgi?id=710021 [ 5 ] Bug #710184 - CVE-2011-1958 wireshark (64bit): NULL pointer dereference by processing of a corrupted Diameter dictionary file https://bugzilla.redhat.com/show_bug.cgi?id=710184
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update wireshark' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-7821
Risk factor : Medium
CVSS Score: 4.3
|