Mailing List Archive

rPSA-2008-0004-1 tshark wireshark
rPath Security Advisory: 2008-0004-1
Published: 2008-01-03
Products:
rPath Linux 1

Rating: Major
Exposure Level Classification:
Indirect User Deterministic Denial of Service
Updated Versions:
tshark=conary.rpath.com@rpl:1/0.99.7-0.1-1
wireshark=conary.rpath.com@rpl:1/0.99.7-0.1-1

rPath Issue Tracking System:
https://issues.rpath.com/browse/RPL-1975

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6440
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6442
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6443
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6444
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6445
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6446
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451

Description:
Previous versions of the wireshark package are vulnerable
to multiple types of Denial of Service attacks, including
crashes and excessive memory consumption. It has not been
determined that these vulnerabilities can be exploited to
execute malicious code.

http://wiki.rpath.com/Advisories:rPSA-2008-0004

Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html