[SECURITY] Fedora 14 Update: wireshark-1.4.4-1.fc14

updates at fedoraproject.org updates at fedoraproject.org
Fri Mar 11 20:54:09 UTC 2011


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-2632
2011-03-04 09:42:09
--------------------------------------------------------------------------------

Name        : wireshark
Product     : Fedora 14
Version     : 1.4.4
Release     : 1.fc14
URL         : http://www.wireshark.org/
Summary     : Network traffic analyzer
Description :
Wireshark is a network traffic analyzer for Unix-ish operating systems.

This package lays base for libpcap, a packet capture and filtering
library, contains command-line utilities, contains plugins and
documentation for wireshark. A graphical user interface is packaged
separately to GTK+ package.

--------------------------------------------------------------------------------
Update Information:

Several security bugs were fixed in this release:
* CVE-2011-0538: memory corruption when reading a malformed pcap file
* CVE-2010-3445: stack overflow in BER dissector
* CVE-2011-1143: Null pointer dereference causing application crash when reading malformed pcap file
* CVE-2011-1140: Multiple stack consumption vulnerabilities caused DoS via crafted SMB or CLDAP packet
* CVE-2011-1141: Malformed LDAP filter string causes Denial of Service via excessive memory consumption
* CVE-2011-1138: Off-by-one error in the dissect_6lowpan_iphc function causes application crash (Denial Of Service)
* CVE-2011-1139: Denial Of Service (application crash) via a pcap-ng file that contains a large packet-length field
* CVE-2011-0713: heap-based buffer overflow when reading malformed Nokia DCT3 phone signalling traces
--------------------------------------------------------------------------------
ChangeLog:

* Thu Mar  3 2011 Jan Safranek <jsafrane at redhat.com>
- upgrade to 1.4.4
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.4.html
* Mon Jan 17 2011 Jan Safranek <jsafrane at redhat.com> - 1.4.2-3
- upgrade to 1.4.3
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.3.html
* Wed Jan  5 2011 Jan Safranek <jsafrane at redhat.com> - 1.4.2-2
- fixed buffer overflow in ENTTEC dissector (#666897)
* Mon Nov 22 2010 Jan Safranek <jsafrane at redhat.com> - 1.4.2-1
- upgrade to 1.4.2
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.2.html
* Mon Nov  1 2010 Jan Safranek <jsafrane at redhat.com> - 1.4.1-2
- temporarily disable zlib until
  https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4955 is resolved (#643461)
* Fri Oct 22 2010 Jan Safranek <jsafrane at redhat.com> - 1.4.1-1
- upgrade to 1.4.1
- see http://www.wireshark.org/docs/relnotes/wireshark-1.4.1.html
- Own the %{_libdir}/wireshark dir (#644508)
- associate *.pcap files with wireshark (#641163)
* Tue Oct  5 2010 jkeating - 1.4.0-2.1
- Rebuilt for gcc bug 634757
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #676232 - CVE-2011-0538 Wireshark: memory corruption when reading a malformed pcap file (upstream bug #5652)
        https://bugzilla.redhat.com/show_bug.cgi?id=676232
  [ 2 ] Bug #678198 - CVE-2011-0713 Wireshark: heap-based buffer overflow when reading malformed Nokia DCT3 phone signalling traces
        https://bugzilla.redhat.com/show_bug.cgi?id=678198
  [ 3 ] Bug #639486 - CVE-2010-3445 wireshark: stack overflow in BER dissector
        https://bugzilla.redhat.com/show_bug.cgi?id=639486
  [ 4 ] Bug #681760 - CVE-2011-1143 Wireshark: Null pointer dereference causing application crash when reading malformed pcap file
        https://bugzilla.redhat.com/show_bug.cgi?id=681760
  [ 5 ] Bug #681754 - CVE-2011-1140 Wireshark: Multiple stack consumption vulnerabilities caused DoS via crafted SMB or CLDAP packet
        https://bugzilla.redhat.com/show_bug.cgi?id=681754
  [ 6 ] Bug #681753 - CVE-2011-1138 Wireshark: Off-by-one error in the dissect_6lowpan_iphc function causes application crash (Denial Of Service)
        https://bugzilla.redhat.com/show_bug.cgi?id=681753
  [ 7 ] Bug #681748 - CVE-2011-1139 Wireshark: Denial Of Service (application crash) via a pcap-ng file that contains a large packet-length field
        https://bugzilla.redhat.com/show_bug.cgi?id=681748
  [ 8 ] Bug #681756 - CVE-2011-1141 Wireshark: Malformed LDAP filter string causes Denial of Service via excessive memory consumption
        https://bugzilla.redhat.com/show_bug.cgi?id=681756
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update wireshark' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list