Wireshark: Multiple Denials of Service
Gentoo Linux Security Advisory
||GLSA 200809-17 / wireshark
||September 25, 2008
||September 25, 2008: 01
All supported architectures
Multiple Denial of Service vulnerabilities have been discovered in
Wireshark is a network protocol analyzer with a graphical front-end.
The following vulnerabilities were reported:
Multiple buffer overflows in the NCP dissector (CVE-2008-3146).
Infinite loop in the NCP dissector (CVE-2008-3932).
Invalid read in the tvb_uncompress() function when processing zlib
compressed data (CVE-2008-3933).
Unspecified error when processing Textronix .rf5 files
A remote attacker could exploit these vulnerabilities by sending
specially crafted packets on a network being monitored by Wireshark or
by enticing a user to read a malformed packet trace file, causing a
Denial of Service.
There is no known workaround at this time.
All Wireshark users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.0.3"