Release date:
Updated on:
Affected Systems:
RedHat Linux
Wireshark 1.x
Unaffected system:
Wireshark 1.4.5
Wireshark 1.2.16
Description:
--------------------------------------------------------------------------------
Bugtraq id: 47392
Wireshark, formerly known as Ethereal, is a very popular network protocol analysis tool.
Wireshark versions earlier than 1.4.5/1.2.16 have multiple remote vulnerabilities. Remote attackers can exploit these vulnerabilities to execute arbitrary code or cause DoS in affected applications.
/Epan/dissectors/packet-dect.c contains stack buffer overflow, which is triggered by an attacker-controlled call to memcpy. The extent of the impact is irrelevant to Wireshark's default version options. attackers can execute arbitrary code when the user is capturing packets. On * NIX systems, this function is always reserved for root users. The buffer that can overflow is pkt_bfield.Data.
<* Source: Paul makoski
Link: http://www.kb.cert.org/vuls/id/243670
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Wireshark
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.wireshark.org/