Sender: |
|
Date: |
Tue, 16 Jun 2009 13:47:04 -0500 |
MIME-version: |
1.0 |
Reply-To: |
|
Content-type: |
text/plain; format=flowed; charset=ISO-8859-1 |
Subject: |
|
From: |
|
Content-transfer-encoding: |
7BIT |
Comments: |
|
Parts/Attachments: |
|
|
Synopsis: Moderate: wireshark security update
Issue date: 2009-06-15
CVE Names: CVE-2009-1210 CVE-2009-1268 CVE-2009-1269
CVE-2009-1829
A format string flaw was found in Wireshark. If Wireshark read a
malformed packet off a network or opened a malicious dump file, it could
crash or, possibly, execute arbitrary code as the user running
Wireshark. (CVE-2009-1210)
Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2009-1268, CVE-2009-1269, CVE-2009-1829)
All running instances of Wireshark must be restarted for the update to
take effect.
SL 3.0.x
SRPMS:
wireshark-1.0.8-EL3.1.src.rpm
i386:
wireshark-1.0.8-EL3.1.i386.rpm
wireshark-gnome-1.0.8-EL3.1.i386.rpm
x86_64:
wireshark-1.0.8-EL3.1.x86_64.rpm
wireshark-gnome-1.0.8-EL3.1.x86_64.rpm
SL 4.x
SRPMS:
wireshark-1.0.8-1.el4_8.1.src.rpm
i386:
wireshark-1.0.8-1.el4_8.1.i386.rpm
wireshark-gnome-1.0.8-1.el4_8.1.i386.rpm
x86_64:
wireshark-1.0.8-1.el4_8.1.x86_64.rpm
wireshark-gnome-1.0.8-1.el4_8.1.x86_64.rpm
SL 5.x
SRPMS:
wireshark-1.0.8-1.el5_3.1.src.rpm
i386:
wireshark-1.0.8-1.el5_3.1.i386.rpm
wireshark-gnome-1.0.8-1.el5_3.1.i386.rpm
x86_64:
wireshark-1.0.8-1.el5_3.1.x86_64.rpm
wireshark-gnome-1.0.8-1.el5_3.1.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|