Home page logo

fulldisclosure logo Full Disclosure mailing list archives

[PLSA 2008-38] Wireshark: Denial of Service
From: Pınar Yanardağ <pinar () pardus org tr>
Date: Sat, 06 Sep 2008 04:11:45 +0300

Pardus Linux Security Advisory 2008-38            security () pardus org tr
       Date: 2008-09-06
   Severity: 3
       Type: Remote


Some vulnerabilities have been reported  in  Wireshark,  which  can  be
exploited by malicious people to cause a DoS (Denial of Service).


1)  Various errors  within  epan/dissectors/packet-ncp2222.inc  can  be
exploited to cause e.g. a crash  or  an  infinite  loop  via  specially
crafted NCP packets.

2) An error while uncompressing  zlib-compressed  packet  data  can  be
exploited to cause a crash via specially crafted packets.

Affected packages:

   Pardus 2008:
     wireshark, all before 1.0.3-22-4
   Pardus 2007:
     wireshark, all before 1.0.3-22-18


There are update(s) for wireshark. You  can  update  them  via  Package
Manager or with a single command from console:

   Pardus 2008:
     pisi up wireshark

   Pardus 2007:
     pisi up wireshark


   * http://bugs.pardus.org.tr/show_bug.cgi?id=8119
   * http://www.wireshark.org/security/wnpa-sec-2008-05.html
   * http://secunia.com/advisories/31674


Pınar Yanardağ
Pardus Security Team

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
  • [PLSA 2008-38] Wireshark: Denial of Service Pınar Yanardağ (Sep 06)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]