Wireshark: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 201110-02 / wireshark
||October 09, 2011
||October 09, 2011: 1
All supported architectures
#323859, #330479, #339401, #346191, #350551, #354197, #357237, #363895, #369683, #373961, #381551, #383823, #386179
Multiple vulnerabilities in Wireshark allow for the remote
execution of arbitrary code, or a Denial of Service condition.
Wireshark is a versatile network protocol analyzer.
Multiple vulnerabilities have been discovered in Wireshark. Please
review the CVE identifiers referenced below for details.
A remote attacker could send specially crafted packets on a network
being monitored by Wireshark, entice a user to open a malformed packet
trace file using Wireshark, or deploy a specially crafted Lua script for
use by Wireshark, possibly resulting in the execution of arbitrary code,
or a Denial of Service condition.
There is no known workaround at this time.
All Wireshark users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.4.9"