Wireshark: Multiple vulnerabilities — GLSA 200607-09

Wireshark (formerly known as Ethereal) is vulnerable to several security issues, potentially allowing the execution of arbitrary code by a remote attacker.

Affected packages

net-analyzer/wireshark on all architectures
Affected versions < 0.99.2
Unaffected versions >= 0.99.2
net-analyzer/ethereal on all architectures
Affected versions <= 0.99.0-r1
Unaffected versions

Background

Wireshark, formerly known as Ethereal, is a popular network protocol analyzer.

Description

Wireshark dissectors have been found vulnerable to a large number of exploits, including off-by-one errors, buffer overflows, format string overflows and an infinite loop.

Impact

Running an affected version of Wireshark or Ethereal could allow for a remote attacker to execute arbitrary code on the user's computer by sending specially crafted packets.

Workaround

There is no known workaround at this time.

Resolution

All Wireshark users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2"

All Ethereal users should migrate to Wireshark:

 # emerge --sync
 # emerge --ask --unmerge net-analyzer/ethereal
 # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2"

To keep the [saved] configuration from Ethereal and reuse it with Wireshark:

 # mv ~/.ethereal ~/.wireshark

References

Release date
July 25, 2006

Latest revision
July 25, 2006: 01

Severity
high

Exploitable
remote

Bugzilla entries