LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: Updated wireshark packages fix multiple Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake A number of vulnerabilities in the Wireshark program were found that could cause crashes, excessive looping, or exhaustion of system memory. This updated provides wireshark 0.99.6 which is not vulnerable to these issues.
 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:145
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : wireshark
 Date    : July 10, 2007
 Affected: 2007.0, 2007.1, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities in the Wireshark program were found that
 could cause crashes, excessive looping, or exhaustion of system memory.
 
 This updated provides wireshark 0.99.6 which is not vulnerable to
 these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393
 http://www.wireshark.org/security/wnpa-sec-2007-02.html
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 b033f6eadc258c248d9fba4469b838e1  2007.0/i586/libwireshark0-0.99.6-0.1mdv2007.0.i586.rpm
 5aad6a1e489f750ddf174649a6319ca2  2007.0/i586/tshark-0.99.6-0.1mdv2007.0.i586.rpm
 c394ef661021c5e62bed70c21c315ffd  2007.0/i586/wireshark-0.99.6-0.1mdv2007.0.i586.rpm
 e851b58c639407a7c9ae25fcfd336774  2007.0/i586/wireshark-tools-0.99.6-0.1mdv2007.0.i586.rpm 
 72beadc31f718f860324544019d3adc3  2007.0/SRPMS/wireshark-0.99.6-0.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 dd9d7af8d82a2eacc871e6a919cad3af  2007.0/x86_64/lib64wireshark0-0.99.6-0.1mdv2007.0.x86_64.rpm
 452de6307f10772c68ebae473ae3c537  2007.0/x86_64/tshark-0.99.6-0.1mdv2007.0.x86_64.rpm
 fa4cc3d56186068a13549dc754529198  2007.0/x86_64/wireshark-0.99.6-0.1mdv2007.0.x86_64.rpm
 74dab97371727e367e997a1a90f7263b  2007.0/x86_64/wireshark-tools-0.99.6-0.1mdv2007.0.x86_64.rpm 
 72beadc31f718f860324544019d3adc3  2007.0/SRPMS/wireshark-0.99.6-0.1mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 a5b8f29cdc32543659a8e0c23f146e33  2007.1/i586/libwireshark0-0.99.6-0mdv2007.1.i586.rpm
 ceb71b951f1185741c9b9be50fda7acc  2007.1/i586/tshark-0.99.6-0mdv2007.1.i586.rpm
 188ee566b140d3a5a270106fdba86516  2007.1/i586/wireshark-0.99.6-0mdv2007.1.i586.rpm
 4a4e07651e01dd9177548b37b7888971  2007.1/i586/wireshark-tools-0.99.6-0mdv2007.1.i586.rpm 
 9ab979db8a493c6d35ee621667af6806  2007.1/SRPMS/wireshark-0.99.6-0mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 83ca8b3c25af33fd0f53ac2bff0adc21  2007.1/x86_64/lib64wireshark0-0.99.6-0mdv2007.1.x86_64.rpm
 4f8159feba8f9cd498d9d6e810a0e555  2007.1/x86_64/tshark-0.99.6-0mdv2007.1.x86_64.rpm
 6cf73daa791ecbcacb505016e0050823  2007.1/x86_64/wireshark-0.99.6-0mdv2007.1.x86_64.rpm
 fa1e1783c619d908a5d0b260adbb5c9f  2007.1/x86_64/wireshark-tools-0.99.6-0mdv2007.1.x86_64.rpm 
 9ab979db8a493c6d35ee621667af6806  2007.1/SRPMS/wireshark-0.99.6-0mdv2007.1.src.rpm

 Corporate 4.0:
 e0bd9a03651d4f29034088368b81aab8  corporate/4.0/i586/libwireshark0-0.99.6-0.1.20060mlcs4.i586.rpm
 1bbb1205a0f0a2d0107f1a6992ceae83  corporate/4.0/i586/tshark-0.99.6-0.1.20060mlcs4.i586.rpm
 88828ce0dc609d86ff1987464813fa02  corporate/4.0/i586/wireshark-0.99.6-0.1.20060mlcs4.i586.rpm
 b1180bb4471aabf35620e391475f81ff  corporate/4.0/i586/wireshark-tools-0.99.6-0.1.20060mlcs4.i586.rpm 
 b72cf2010d3c7afd8f00e99ed6d28430  corporate/4.0/SRPMS/wireshark-0.99.6-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 794ca2e7faf95f0c6f6527523bbd56cb  corporate/4.0/x86_64/lib64wireshark0-0.99.6-0.1.20060mlcs4.x86_64.rpm
 4673373f4d25fafb8da9b306c7afc0c6  corporate/4.0/x86_64/tshark-0.99.6-0.1.20060mlcs4.x86_64.rpm
 8a1d126e0524d69fb719c9374f45d64d  corporate/4.0/x86_64/wireshark-0.99.6-0.1.20060mlcs4.x86_64.rpm
 5d86ebcdf606a1c8406ddb6a086c09e6  corporate/4.0/x86_64/wireshark-tools-0.99.6-0.1.20060mlcs4.x86_64.rpm 
 b72cf2010d3c7afd8f00e99ed6d28430  corporate/4.0/SRPMS/wireshark-0.99.6-0.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
USB is now UEC (use with extreme caution)
iPhone Encryption and the Return of the Crypto Wars
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.