Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14893
HistoryNov 02, 2006 - 12:00 a.m.

rPSA-2006-0202-1 tshark wireshark

2006-11-0200:00:00
vulners.com
9

rPath Security Advisory: 2006-0202-1
Published: 2006-11-01
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Remote Deterministic Denial of Service
Updated Versions:
wireshark=/conary.rpath.com@rpl:devel//1/0.99.4-0.1-1
tshark=/conary.rpath.com@rpl:devel//1/0.99.4-0.1-1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4805
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5468
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5469
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5740
https://issues.rpath.com/browse/RPL-746

Description:
In previous versions of the wireshark and tshark packages, and all
versions of the ethereal and tethereal packages, are vulnerable to
several remote Denial of Service attacks which can cause the
application to crash. None of these vulnerabilities is currently
believed to enable remote unauthorized access.

The fixes are available only as part of the wireshark package.
Development of the ethereal program has ceased under the ethereal
name and continued under the wireshark name, due to restrictions
on the use of the "ethereal" trademark.  The latest version of the
ethereal and tethereal packages in rPath Linux 1 are now redirects
to the wireshark and tshark packages.  The command "conary update
ethereal tethereal" will cause the ethereal and tethereal packages
on the system to be replaced by wireshark and tshark, respectively.
The "conary updateall" command will also appropriately migrate the
system from ethereal to wireshark.