Home / vulnerabilitiesPDF  

PLSA-2008-38.txt

Posted on 06 September 2008
Source : packetstormsecurity.org Link

 

------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-38 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2008-09-06
Severity: 3
Type: Remote
------------------------------------------------------------------------

Summary
=======

Some vulnerabilities have been reported in Wireshark, which can be
exploited by malicious people to cause a DoS (Denial of Service).


Description
===========

1) Various errors within epan/dissectors/packet-ncp2222.inc can be
exploited to cause e.g. a crash or an infinite loop via specially
crafted NCP packets.


2) An error while uncompressing zlib-compressed packet data can be
exploited to cause a crash via specially crafted packets.


Affected packages:

Pardus 2008:
wireshark, all before 1.0.3-22-4
Pardus 2007:
wireshark, all before 1.0.3-22-18


Resolution
==========

There are update(s) for wireshark. You can update them via Package
Manager or with a single command from console:

Pardus 2008:
pisi up wireshark

Pardus 2007:
pisi up wireshark


References
==========

* http://bugs.pardus.org.tr/show_bug.cgi?id=8119
* http://www.wireshark.org/security/wnpa-sec-2008-05.html
* http://secunia.com/advisories/31674

------------------------------------------------------------------------

--
Pınar Yanardağ
Pardus Security Team
http://security.pardus.org.tr


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 

TOP