TUCoPS :: Linux :: Mandrake/Mandriva :: va3124.htm

wireshark vulns
wireshark
wireshark




-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:088
http://www.mandriva.com/security/ 
 _______________________________________________________________________

 Package : wireshark
 Date    : April 9, 2009
 Affected: 2008.1, 2009.0, Corporate 4.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been identified and corrected in
 wireshark:
 
  o The PROFINET dissector was vulnerable to a format string overflow
  (CVE-2009-1210).
 
  o The Check Point High-Availability Protocol (CPHAP) dissecto could
  crash (CVE-2009-1268).
 
  o Wireshark could crash while loading a Tektronix .rf5 file
  (CVE-2009-1269).
 
 This update provides Wireshark 1.0.7, which is not vulnerable to
 these issues.
 _______________________________________________________________________

 References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269 
http://www.wireshark.org/security/wnpa-sec-2009-02.html 
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 1dc62d022c4cbaa5ca9b07e089cd2a12  2008.1/i586/dumpcap-1.0.7-0.1mdv2008.1.i586.rpm
 56a350f069b514514615d58a2c4d2cc0  2008.1/i586/libwireshark0-1.0.7-0.1mdv2008.1.i586.rpm
 6b77a007c2f75ab0c048891ce01935ad  2008.1/i586/libwireshark-devel-1.0.7-0.1mdv2008.1.i586.rpm
 0362de945cda3c60f97de2ffecc9cc62  2008.1/i586/rawshark-1.0.7-0.1mdv2008.1.i586.rpm
 951fcc1d89f98da0a5eb4b9a40304d37  2008.1/i586/tshark-1.0.7-0.1mdv2008.1.i586.rpm
 72feaee83f92f0889450c962b7620016  2008.1/i586/wireshark-1.0.7-0.1mdv2008.1.i586.rpm
 d4792c75c5dbf8f8d01f98a6bd03abf9  2008.1/i586/wireshark-tools-1.0.7-0.1mdv2008.1.i586.rpm 
 cc39d293bcdde09757d7c8eee9cf09fc  2008.1/SRPMS/wireshark-1.0.7-0.1mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 bc85820ec0857eeccdc7a6beb33512c1  2008.1/x86_64/dumpcap-1.0.7-0.1mdv2008.1.x86_64.rpm
 33d696120c8a6b2456cf32986e958d6a  2008.1/x86_64/lib64wireshark0-1.0.7-0.1mdv2008.1.x86_64.rpm
 c702bb0c37d362ad428020fd3504d14d  2008.1/x86_64/lib64wireshark-devel-1.0.7-0.1mdv2008.1.x86_64.rpm
 2fdb45d92da41b695cfa5c4312f754b0  2008.1/x86_64/rawshark-1.0.7-0.1mdv2008.1.x86_64.rpm
 622105a108c69497f97fa029545112fe  2008.1/x86_64/tshark-1.0.7-0.1mdv2008.1.x86_64.rpm
 10f2f59bc26917a1345bc96eced4bdde  2008.1/x86_64/wireshark-1.0.7-0.1mdv2008.1.x86_64.rpm
 f7bc70beed52589f61f579629a1c39c8  2008.1/x86_64/wireshark-tools-1.0.7-0.1mdv2008.1.x86_64.rpm 
 cc39d293bcdde09757d7c8eee9cf09fc  2008.1/SRPMS/wireshark-1.0.7-0.1mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 5f374dee7a3e806aa8f55e222cf7a875  2009.0/i586/dumpcap-1.0.7-0.1mdv2009.0.i586.rpm
 50c880fb63f1d29f970e08907eb17e6a  2009.0/i586/libwireshark0-1.0.7-0.1mdv2009.0.i586.rpm
 aecb17f6c08968009c2943a86b1ac134  2009.0/i586/libwireshark-devel-1.0.7-0.1mdv2009.0.i586.rpm
 98ddaa9298f0dc2b9d9bcc6746e0a757  2009.0/i586/rawshark-1.0.7-0.1mdv2009.0.i586.rpm
 ce249c97cf2f80fba97c54f12386b60d  2009.0/i586/tshark-1.0.7-0.1mdv2009.0.i586.rpm
 fafb35021c36244cb71dd3c3664ada28  2009.0/i586/wireshark-1.0.7-0.1mdv2009.0.i586.rpm
 b672985920730bc14e03688ac56d6c50  2009.0/i586/wireshark-tools-1.0.7-0.1mdv2009.0.i586.rpm 
 d5758cdd51c62cf50348b9b868262b1f  2009.0/SRPMS/wireshark-1.0.7-0.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 fde0562d4244fcd5c46bd426123bb762  2009.0/x86_64/dumpcap-1.0.7-0.1mdv2009.0.x86_64.rpm
 a94780e9a7fe2a90fef2ec6f76b1b4d3  2009.0/x86_64/lib64wireshark0-1.0.7-0.1mdv2009.0.x86_64.rpm
 cab3b23f1c2649c9035f396a6ac5b89a  2009.0/x86_64/lib64wireshark-devel-1.0.7-0.1mdv2009.0.x86_64.rpm
 1d5d4f151b02eb721b2aa2391bef5b15  2009.0/x86_64/rawshark-1.0.7-0.1mdv2009.0.x86_64.rpm
 0e80a0db6dc3243f35e18eb0e42ba6b6  2009.0/x86_64/tshark-1.0.7-0.1mdv2009.0.x86_64.rpm
 596cbc632f8cb9d9bfd817b7e3449d79  2009.0/x86_64/wireshark-1.0.7-0.1mdv2009.0.x86_64.rpm
 caf11a295f23aad7100719ff3d0afe46  2009.0/x86_64/wireshark-tools-1.0.7-0.1mdv2009.0.x86_64.rpm 
 d5758cdd51c62cf50348b9b868262b1f  2009.0/SRPMS/wireshark-1.0.7-0.1mdv2009.0.src.rpm

 Corporate 4.0:
 0fa546e721b3dafeec3c8dd737d5f414  corporate/4.0/i586/dumpcap-1.0.7-0.1.20060mlcs4.i586.rpm
 b7e8cc21418e0876ea6fabbf5416aff5  corporate/4.0/i586/libwireshark0-1.0.7-0.1.20060mlcs4.i586.rpm
 710a98dac2c3aaec7c71719e589ebab3  corporate/4.0/i586/libwireshark-devel-1.0.7-0.1.20060mlcs4.i586.rpm
 327d0395e370053fb419921046bc35de  corporate/4.0/i586/rawshark-1.0.7-0.1.20060mlcs4.i586.rpm
 7e6f1992ea5affd89c7c22764c4cdaa1  corporate/4.0/i586/tshark-1.0.7-0.1.20060mlcs4.i586.rpm
 4ea42e9e0ab0d057b730949bb9250dcd  corporate/4.0/i586/wireshark-1.0.7-0.1.20060mlcs4.i586.rpm
 a6ea90713046fe7d842ee0eb1a2c6157  corporate/4.0/i586/wireshark-tools-1.0.7-0.1.20060mlcs4.i586.rpm 
 b77a43dad87dcdf1b3ab423c4f259968  corporate/4.0/SRPMS/wireshark-1.0.7-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 e171bf67fe81f37840701fb485745724  corporate/4.0/x86_64/dumpcap-1.0.7-0.1.20060mlcs4.x86_64.rpm
 e2e552e09f83e146b38a683c45774bc6  corporate/4.0/x86_64/lib64wireshark0-1.0.7-0.1.20060mlcs4.x86_64.rpm
 e23f2a9c9205f37f83a432041462a565  corporate/4.0/x86_64/lib64wireshark-devel-1.0.7-0.1.20060mlcs4.x86_64.rpm
 9a9e0f90250d7f86542245337f1ab129  corporate/4.0/x86_64/rawshark-1.0.7-0.1.20060mlcs4.x86_64.rpm
 7f1c21606cd56e0601c1c8ef0198e331  corporate/4.0/x86_64/tshark-1.0.7-0.1.20060mlcs4.x86_64.rpm
 2c7ea9cada7e6ccbe93afc5416fe3082  corporate/4.0/x86_64/wireshark-1.0.7-0.1.20060mlcs4.x86_64.rpm
 81b6e83c830134f2d27b5a0b5eb1a322  corporate/4.0/x86_64/wireshark-tools-1.0.7-0.1.20060mlcs4.x86_64.rpm 
 b77a43dad87dcdf1b3ab423c4f259968  corporate/4.0/SRPMS/wireshark-1.0.7-0.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories 

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJ3hPhmqjQ0CJFipgRAhz/AKDjSq7sPprC9tWlhMjgIfITORd4PgCgjrXU
gaULtFH6xKkoP9zk+unXto0=bavR
-----END PGP SIGNATURE-----


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH