Pardus: wireshark Denial of Service
Posted by Bill Keys   
A vulnerability has been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the SMTP dissector and can be exploited to trigger the execution of an infinite loop via a large SMTP packet.
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-76            security at pardus.org.tr
------------------------------------------------------------------------
      Date: 2008-12-05
  Severity: 3
      Type: Remote
------------------------------------------------------------------------

Summary
=======

A vulnerability has been reported in Wireshark, which can be  exploited 
by malicious people to cause a DoS (Denial of Service). 


Description
===========

The vulnerability is caused due to an error in the SMTP  dissector  and 
can be exploited to trigger the execution of an  infinite  loop  via  a 
large SMTP packet. 


Affected packages:

  Pardus 2008:
    wireshark, all before 1.0.5_pre1-24-6
  Pardus 2007:
    wireshark, all before 1.0.5_pre1-24-20


Resolution
==========

There are update(s) for wireshark. You  can  update  them  via  Package 
Manager or with a single command from console: 

  Pardus 2008:
    pisi up wireshark

  Pardus 2007:
    pisi up wireshark


References
==========

  * http://bugs.pardus.org.tr/show_bug.cgi?id=8717
  * http://anonsvn.wireshark.org/viewvc?view=rev&revision=24989
  * http://lists.grok.org.uk/pipermail/full-disclosure/2008-November/065840.html

------------------------------------------------------------------------

-- 
Pardus Security Team
http://security.pardus.org.tr