Users of Wireshark please be advised of a Heap-based buffer overflow vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
MDVSA-2010:242: [MDVSA-2010:242] wireshark Buffer-overflow
Problem Description:Read more at www.criticalwatch.com
This advisory updates wireshark to the latest version (1.2.13),
fixing one security issue:
Heap-based buffer overflow in the dissect_ldss_transfer function
(epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark
1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers
to cause a denial of service (crash) and possibly execute arbitrary
code via an LDSS packet with a long digest line that triggers memory
corruption (CVE-2010-4300).
See this Amp at http://bit.ly/evQAZS
No comments:
Post a Comment