exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2011-007

Mandriva Linux Security Advisory 2011-007
Posted Jan 14, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-007 - Buffer overflow in the MAC-LTE dissector in Wireshark 1.2.0 through 1.2.13 and 1.4.0 through 1.4.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large number of RARs. The updated packages have been upgraded to the latest version which is not affected by this issue.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2011-0444
SHA-256 | d6555124941bcfbee1373e244767eaccf37588cac85e2d2e2e018011ebf469c9

Mandriva Linux Security Advisory 2011-007

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:007
http://www.mandriva.com/security/
_______________________________________________________________________

Package : wireshark
Date : January 14, 2011
Affected: 2010.0, 2010.1
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in wireshark:

Buffer overflow in the MAC-LTE dissector
(epan/dissectors/packet-mac-lte.c) in Wireshark 1.2.0 through 1.2.13
and 1.4.0 through 1.4.2 allows remote attackers to cause a denial
of service (crash) and possibly execute arbitrary code via a large
number of RARs (CVE-2011-0444).

The updated packages have been upgraded to the latest version (1.2.14)
which is not affected by this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0444
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.0:
3a2f0ae73575edebf59af5cd0a990d5e 2010.0/i586/dumpcap-1.2.14-0.1mdv2010.0.i586.rpm
5a1cac2e193ac88f79bcf2ed17325f49 2010.0/i586/libwireshark0-1.2.14-0.1mdv2010.0.i586.rpm
08fd6b3b4bbad72921a242e94ecd0763 2010.0/i586/libwireshark-devel-1.2.14-0.1mdv2010.0.i586.rpm
704293ddee33f12d3e2780d9c5f70eaa 2010.0/i586/rawshark-1.2.14-0.1mdv2010.0.i586.rpm
9b4bb13cf3adfe6c6b9b4ec5a71bb747 2010.0/i586/tshark-1.2.14-0.1mdv2010.0.i586.rpm
4304f98c8600d4a75b46557191c59d5c 2010.0/i586/wireshark-1.2.14-0.1mdv2010.0.i586.rpm
b8be2c40e9b35ca5687be8bdf5cbc92e 2010.0/i586/wireshark-tools-1.2.14-0.1mdv2010.0.i586.rpm
0d6a391360c69ad056e53611b40cd791 2010.0/SRPMS/wireshark-1.2.14-0.1mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
2a81db424d352797b438b4501bc5b141 2010.0/x86_64/dumpcap-1.2.14-0.1mdv2010.0.x86_64.rpm
cca932a82dc554d0534f0f02b2ccf8e3 2010.0/x86_64/lib64wireshark0-1.2.14-0.1mdv2010.0.x86_64.rpm
ccdf660e37dcbed9256bf0be74495781 2010.0/x86_64/lib64wireshark-devel-1.2.14-0.1mdv2010.0.x86_64.rpm
ccf5ba5f67ab88c7fe8c6db8ae43526a 2010.0/x86_64/rawshark-1.2.14-0.1mdv2010.0.x86_64.rpm
0798e4c09151a21a7a33146cf146306e 2010.0/x86_64/tshark-1.2.14-0.1mdv2010.0.x86_64.rpm
eb40a51beb7e55f81dd8ad0ee21bd5ef 2010.0/x86_64/wireshark-1.2.14-0.1mdv2010.0.x86_64.rpm
0d770ab861c52d43a7ae422a65ac53ef 2010.0/x86_64/wireshark-tools-1.2.14-0.1mdv2010.0.x86_64.rpm
0d6a391360c69ad056e53611b40cd791 2010.0/SRPMS/wireshark-1.2.14-0.1mdv2010.0.src.rpm

Mandriva Linux 2010.1:
7de8db5688b998288ab369481eca35c0 2010.1/i586/dumpcap-1.2.14-0.1mdv2010.2.i586.rpm
22a29bec1152910d35e35637fabb0f5c 2010.1/i586/libwireshark0-1.2.14-0.1mdv2010.2.i586.rpm
06fa495e77df6be1e21371c1d4a315d2 2010.1/i586/libwireshark-devel-1.2.14-0.1mdv2010.2.i586.rpm
53b3e0c48b0ab71dfc79984dce5bb358 2010.1/i586/rawshark-1.2.14-0.1mdv2010.2.i586.rpm
90efaca0d453f9a78b1afe3e95ef98c1 2010.1/i586/tshark-1.2.14-0.1mdv2010.2.i586.rpm
c44df29a8b5b47ad02bd3ff673686e86 2010.1/i586/wireshark-1.2.14-0.1mdv2010.2.i586.rpm
de8b12c12a02924da1297d4c79de9309 2010.1/i586/wireshark-tools-1.2.14-0.1mdv2010.2.i586.rpm
31b07947f65c4e3c2bfbb8bcb415d6b5 2010.1/SRPMS/wireshark-1.2.14-0.1mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
ea65c3b7951494a52747af3d8f699810 2010.1/x86_64/dumpcap-1.2.14-0.1mdv2010.2.x86_64.rpm
fa83276f456b101e30078ff25f352148 2010.1/x86_64/lib64wireshark0-1.2.14-0.1mdv2010.2.x86_64.rpm
51467848acf4bfd385cdd82b5d8e7f9f 2010.1/x86_64/lib64wireshark-devel-1.2.14-0.1mdv2010.2.x86_64.rpm
e19576e3fb9e9bff0b88697bf8d66a57 2010.1/x86_64/rawshark-1.2.14-0.1mdv2010.2.x86_64.rpm
1c7064af60034bb8574c54e8ea23bab4 2010.1/x86_64/tshark-1.2.14-0.1mdv2010.2.x86_64.rpm
b6e97be88b31556a8ad0ce1365723a82 2010.1/x86_64/wireshark-1.2.14-0.1mdv2010.2.x86_64.rpm
b28c4a799e75bfdd3d3fd9995cbd2150 2010.1/x86_64/wireshark-tools-1.2.14-0.1mdv2010.2.x86_64.rpm
31b07947f65c4e3c2bfbb8bcb415d6b5 2010.1/SRPMS/wireshark-1.2.14-0.1mdv2010.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFNMEQymqjQ0CJFipgRAixrAKCRK+4bTIfUcUHICrmvBcXzu4SDFwCeOuK3
iNg1P9keaBpfxZ8hperQtUc=
=CY2n
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close